Software protection
Article
Falcarin, P., Collberg, Christian, Atallah, Mikhail and Jakubowski, Mariusz 2011. Software protection. IEEE Software. 28 (2), pp. 24-27.
Authors | Falcarin, P., Collberg, Christian, Atallah, Mikhail and Jakubowski, Mariusz |
---|---|
Abstract | A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention. |
Keywords | software protection; software security; malware |
Journal | IEEE Software |
Journal citation | 28 (2), pp. 24-27 |
ISSN | 0740-7459 |
Year | 2011 |
Accepted author manuscript | License CC BY-ND |
Web address (URL) | http://www.computer.org/portal/web/csdl/abs/html/mags/so/2011/02/mso2011020024.htm |
http://hdl.handle.net/10552/1570 | |
Publication dates | |
Mar 2011 | |
Publication process dates | |
Deposited | 26 Apr 2012 |
Additional information | Citation: |
https://repository.uel.ac.uk/item/8610x
Download files
373
total views166
total downloads9
views this month8
downloads this month