The Community for Technology Leaders
RSS Icon
Issue No.07 - July (2003 vol.36)
pp: 64-71
Gleb Naumovich , Polytechnic University
Nasir Memon , Polytechnic University
<p>As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static?rather, data is manipulated by software, often in a net-worked environment.</p><p>Software is increasingly being distributed as mobile code in architecture-independent formats. Using reverse engineering, malicious parties can steal the intellectual property associated with such code with relative ease. Three promising techniques under development--tamper proofing, obfuscation, and watermarking--offer hope for providing more efficient and effective mechanisms for protecting software.</p><p></p>
Gleb Naumovich, Nasir Memon, "Preventing Piracy, Reverse Engineering, and Tampering", Computer, vol.36, no. 7, pp. 64-71, July 2003, doi:10.1109/MC.2003.1212692
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool