This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hindering Reverse Engineering: Thinking Outside the Box
March/April 2008 (vol. 6 no. 2)
pp. 58-65
Thomas E. Dube, US Air Force Institute of Technology
Bobby D. Birrer, US Air Force Institute of Technology
Richard A. Raines, Air Force Institute of Technology
Rusty O. Baldwin, Air Force Institute of Technology
Barry E. Mullins, Air Force Institute of Technology
Robert W. Bennington, US Air Force Research Laboratory
Christopher E. Reuter, US Air Force Research Laboratory
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.

1. E. Eilam, Reversing: Secrets of Reverse Engineering, Wiley, 2005, pp. 337–43.
2. T. Dube, Metamorphism as a Software Protection for Non-Malicious Code, master's thesis, Air Force Inst. Technology, 2006, pp. 8–11.
3. IA-32 Intel Architecture Software Developer's Manual Volume 3: System Programming Guide, Intel, June 2005, p. 15–3.
4. C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, Univ. of Auckland, 1997.
5. P. Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, 2005.

Index Terms:
software reverse engineering, metamorphic software, software protection
Citation:
Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter, "Hindering Reverse Engineering: Thinking Outside the Box," IEEE Security & Privacy, vol. 6, no. 2, pp. 58-65, March-April 2008, doi:10.1109/MSP.2008.33
Usage of this product signifies your acceptance of the Terms of Use.