The Community for Technology Leaders
Green Image
Issue No. 07 - July (2003 vol. 36)
ISSN: 0018-9162
pp: 64-71
Gleb Naumovich , Polytechnic University
Nasir Memon , Polytechnic University
<p>As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static?rather, data is manipulated by software, often in a net-worked environment.</p><p>Software is increasingly being distributed as mobile code in architecture-independent formats. Using reverse engineering, malicious parties can steal the intellectual property associated with such code with relative ease. Three promising techniques under development--tamper proofing, obfuscation, and watermarking--offer hope for providing more efficient and effective mechanisms for protecting software.</p><p></p>

G. Naumovich and N. Memon, "Preventing Piracy, Reverse Engineering, and Tampering," in Computer, vol. 36, no. , pp. 64-71, 2003.
91 ms
(Ver 3.3 (11022016))