Issue No. 02 - March/April (2008 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2008.33
Thomas E. Dube , US Air Force Institute of Technology
Bobby D. Birrer , US Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Robert W. Bennington , US Air Force Research Laboratory
Christopher E. Reuter , US Air Force Research Laboratory
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.
software reverse engineering, metamorphic software, software protection
R. A. Raines et al., "Hindering Reverse Engineering: Thinking Outside the Box," in IEEE Security & Privacy, vol. 6, no. , pp. 58-65, 2008.