The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2008 vol.6)
pp: 58-65
Thomas E. Dube , US Air Force Institute of Technology
Bobby D. Birrer , US Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Robert W. Bennington , US Air Force Research Laboratory
Christopher E. Reuter , US Air Force Research Laboratory
ABSTRACT
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.
INDEX TERMS
software reverse engineering, metamorphic software, software protection
CITATION
Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter, "Hindering Reverse Engineering: Thinking Outside the Box", IEEE Security & Privacy, vol.6, no. 2, pp. 58-65, March/April 2008, doi:10.1109/MSP.2008.33
REFERENCES
1. E. Eilam, Reversing: Secrets of Reverse Engineering, Wiley, 2005, pp. 337–43.
2. T. Dube, Metamorphism as a Software Protection for Non-Malicious Code, master's thesis, Air Force Inst. Technology, 2006, pp. 8–11.
3. IA-32 Intel Architecture Software Developer's Manual Volume 3: System Programming Guide, Intel, June 2005, p. 15–3.
4. C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, Univ. of Auckland, 1997.
5. P. Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, 2005.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool