Hindering Reverse Engineering: Thinking Outside the Box
Document Type
Article
Publication Date
3-2008
Publication Source
IEEE Security and Privacy
Abstract
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.
Inclusive pages
58-65
ISBN/ISSN
1540-7993
Copyright
Copyright © 2008, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Publisher
Institute of Electrical and Electronics Engineers
Volume
6
Peer Reviewed
yes
Issue
2
eCommons Citation
Dube, Thomas E.; Birrer, Bobby D.; Raines, Richard; Baldwin, Rusty O.; Mullins, Barry; Bennington, Robert W.; and Reuter, Christopher E., "Hindering Reverse Engineering: Thinking Outside the Box" (2008). Computer Science Faculty Publications. 121.
https://ecommons.udayton.edu/cps_fac_pub/121
COinS
Comments
Permission documentation on file.