Software protection
Data(s) |
01/03/2011
|
---|---|
Resumo |
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention. |
Formato |
text |
Identificador |
http://roar.uel.ac.uk/1570/1/2011_Falcarin_etal_Software_Protection.pdf Falcarin, Paolo and Collberg, Christian and Atallah, Mikhail and Jakubowski, Mariusz (2011) ‘Software protection’, IEEE Software, 28(2), pp. 24-27. |
Relação |
http://www.computer.org/portal/web/csdl/abs/html/mags/so/2011/02/mso2011020024.htm http://roar.uel.ac.uk/1570/ |
Tipo |
Article PeerReviewed |