Preventing piracy, reverse engineering, and tampering

Gleb Naumovich, Nasir Memon

Research output: Contribution to journalArticle

Abstract

With the advent of networked appliances, mobile code, and pervasive access to the Internet, software protection has gained increasing importance. Current and promising new techniques designed to reliably preserve and protect software data vital to piracy and security are addressed. Three of these are tamperproofing, obfuscation, and watermarking.

Original languageEnglish (US)
Pages (from-to)64-71
Number of pages8
JournalComputer
Volume36
Issue number7
DOIs
StatePublished - Jul 2003

Fingerprint

Reverse engineering
Watermarking
Internet

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Hardware and Architecture
  • Software

Cite this

Preventing piracy, reverse engineering, and tampering. / Naumovich, Gleb; Memon, Nasir.

In: Computer, Vol. 36, No. 7, 07.2003, p. 64-71.

Research output: Contribution to journalArticle

Naumovich, Gleb ; Memon, Nasir. / Preventing piracy, reverse engineering, and tampering. In: Computer. 2003 ; Vol. 36, No. 7. pp. 64-71.
@article{d002a4dd95ac405ba9b3705fab8a6092,
title = "Preventing piracy, reverse engineering, and tampering",
abstract = "With the advent of networked appliances, mobile code, and pervasive access to the Internet, software protection has gained increasing importance. Current and promising new techniques designed to reliably preserve and protect software data vital to piracy and security are addressed. Three of these are tamperproofing, obfuscation, and watermarking.",
author = "Gleb Naumovich and Nasir Memon",
year = "2003",
month = "7",
doi = "10.1109/MC.2003.1212692",
language = "English (US)",
volume = "36",
pages = "64--71",
journal = "ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering",
issn = "0018-9162",
publisher = "IEEE Computer Society",
number = "7",

}

TY - JOUR

T1 - Preventing piracy, reverse engineering, and tampering

AU - Naumovich, Gleb

AU - Memon, Nasir

PY - 2003/7

Y1 - 2003/7

N2 - With the advent of networked appliances, mobile code, and pervasive access to the Internet, software protection has gained increasing importance. Current and promising new techniques designed to reliably preserve and protect software data vital to piracy and security are addressed. Three of these are tamperproofing, obfuscation, and watermarking.

AB - With the advent of networked appliances, mobile code, and pervasive access to the Internet, software protection has gained increasing importance. Current and promising new techniques designed to reliably preserve and protect software data vital to piracy and security are addressed. Three of these are tamperproofing, obfuscation, and watermarking.

UR - http://www.scopus.com/inward/record.url?scp=0041848575&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0041848575&partnerID=8YFLogxK

U2 - 10.1109/MC.2003.1212692

DO - 10.1109/MC.2003.1212692

M3 - Article

AN - SCOPUS:0041848575

VL - 36

SP - 64

EP - 71

JO - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

JF - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

SN - 0018-9162

IS - 7

ER -