Falcarin, P., Collberg, Christian, Atallah, Mikhail and Jakubowski, Mariusz 2011. Software protection. IEEE Software. 28 (2), pp. 24-27.
|Authors||Falcarin, P., Collberg, Christian, Atallah, Mikhail and Jakubowski, Mariusz|
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.
|Keywords||software protection; software security; malware|
|Journal citation||28 (2), pp. 24-27|
|Accepted author manuscript|
|Web address (URL)||http://www.computer.org/portal/web/csdl/abs/html/mags/so/2011/02/mso2011020024.htm|
|Publication process dates|
|Deposited||26 Apr 2012|
1views this month
0downloads this month