Software protection


Autoria(s): Falcarin, Paolo; Collberg, Christian; Atallah, Mikhail; Jakubowski, Mariusz
Data(s)

01/03/2011

Resumo

A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.

Formato

text

Identificador

http://roar.uel.ac.uk/1570/1/2011_Falcarin_etal_Software_Protection.pdf

Falcarin, Paolo and Collberg, Christian and Atallah, Mikhail and Jakubowski, Mariusz (2011) ‘Software protection’, IEEE Software, 28(2), pp. 24-27.

Relação

http://www.computer.org/portal/web/csdl/abs/html/mags/so/2011/02/mso2011020024.htm

http://roar.uel.ac.uk/1570/

Tipo

Article

PeerReviewed