This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
March/April 2011 (vol. 28 no. 2)
pp. 24-27
Paolo Falcarin, University of East London
Christian Collberg, University of Arizona
Mikhail Atallah, Purdue University
Mariusz Jakubowski, Microsoft Research
Software protection is increasingly becoming an important requirement for industrial software development, especially when building systems for military defense, national infrastructure, and medical informatics. Every software vendor should be aware of the potential for attacks against its products and the techniques available to mitigate these attacks. Employing software protection techniques can mean the difference between business survival and failure. The guest editors present this special issue on new tools and techniques for software protection.

1. C. Collberg and J Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison-Wesley, 2009.
2. B. Wyseur, "White-Box Cryptography," PhD thesis, Computer Security and Industrial Cryptography (COSIC), Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 2009.
3. T. Claburn, "Smart Grid Lacks Smart Security," InformationWeek,24 Mar. 2009; www.informationweek.com/news/infrastructure/ managementshowArticle.jhtml?articleID=216200240 .
4. S.E. Siwek, "Video Games in the 21st Century: The 2010 Report," Entertainment Software Assoc., 2010; www.theesa.com/facts/pdfsVideoGames21stCentury_2010.pdf .
5. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Advances in Cryptology (CRYPTO 01), LNCS 2139, Springer Verlag, 2001, pp. 1–18.
6. F.B. Cohen, "Operating System Protection through Program Evolution," Computer Security, vol. 12, no. 6, 1993, pp. 565–584.
7. C. Wang, "A Security Architecture for Survivability Mechanisms," PhD thesis, Dept. of Computer Science, Univ. Virginia, 2000.
8. P. Falcarin et al., "Exploiting Code Mobility for Dynamic Binary Obfuscation," to be published in Proc. IEEE World Conf. Internet Security (WorldCIS), Feb. 2011.
9. H. Chang and M.J. Atallah, "Protecting Software Code by Guards," ACM Workshop Security and Privacy in Digital Rights Management, ACM Press, 2001, pp. 160–175.
10. M. Jacob, M.H. Jakubowski, and R. Venkatesan, "Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings," Proc. 9th ACM Workshop on Multimedia & Security, ACM Press, 2007, pp. 129–140.
11. R. Scandariato et al., "Application-Oriented Trust in Distributed Computing," Proc. IEEE Int'l Conf. Availability, Reliability and Security (ARES), IEEE Press, 2008, pp. 434–439.
12. R. Kennel and L.H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," Proc. 12th Usenix Security Symp., Usenix Assoc., 2003, pp. 295–310.

Index Terms:
software protectionsecurityprivacy
Citation:
Paolo Falcarin, Christian Collberg, Mikhail Atallah, Mariusz Jakubowski, "Guest Editors' Introduction: Software Protection," IEEE Software, vol. 28, no. 2, pp. 24-27, March-April 2011, doi:10.1109/MS.2011.34
Usage of this product signifies your acceptance of the Terms of Use.