Software disengineering: Program hiding architecture and experiments

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Protecting software is becoming important in the context of modern Internet technologies; often such protection efforts are kept as trade secrets. In this paper, we take a step toward understanding such protection mechanisms and their impact on performance and security. We present a program hiding architecture that utilizes an automatic hiding tool. The hiding tool generates programs that are resistant to reverse engineering by applying software transformations. Our approach protects against the learning of inner workings (and subsequently tampering) of executables in environments that lack appropriate hardware support and where programs may contain certain private knowledge components (proprietary algorithms). We designed and implemented a prototype of a hiding tool for Tcl. We studied the effect of transformations on the execution time of Tcl scripts and suggest a security checking experimentation as well.

Cite

CITATION STYLE

APA

Valdez, E., & Yung, M. (2000). Software disengineering: Program hiding architecture and experiments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1768, pp. 379–394). Springer Verlag. https://doi.org/10.1007/10719724_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free