The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2008 vol.6)
pp: 58-65
Thomas E. Dube , US Air Force Institute of Technology
Bobby D. Birrer , US Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Robert W. Bennington , US Air Force Research Laboratory
Christopher E. Reuter , US Air Force Research Laboratory
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.
software reverse engineering, metamorphic software, software protection
Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter, "Hindering Reverse Engineering: Thinking Outside the Box", IEEE Security & Privacy, vol.6, no. 2, pp. 58-65, March/April 2008, doi:10.1109/MSP.2008.33
1. E. Eilam, Reversing: Secrets of Reverse Engineering, Wiley, 2005, pp. 337–43.
2. T. Dube, Metamorphism as a Software Protection for Non-Malicious Code, master's thesis, Air Force Inst. Technology, 2006, pp. 8–11.
3. IA-32 Intel Architecture Software Developer's Manual Volume 3: System Programming Guide, Intel, June 2005, p. 15–3.
4. C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, Univ. of Auckland, 1997.
5. P. Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, 2005.
357 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool