ABSTRACT
While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourcing partners will become competitors in the future. In this paper we propose an approach to protect proprietary software by increasing its complexity, to prevent reverse engineering. We introduce four Conjectures for protecting our software through obfuscation and explore and provide rationale for why these four Conjectures make logical sense and should be considered for further formal experiments.
- C. Collberg, J. Davidson, R. Giacobazzi, Y. X. Gu, A. Herzberg, and F. Wang. Toward digital asset protection. IEEE Intelligent Systems, November/December 2011. Google ScholarDigital Library
- M. H. Halstead. Elements of Software Science. Elsevier, 1977. Google ScholarDigital Library
- T. McCabe. A complexity measure. IEEE Transactions on Software Engineering, 2(4), December 1976. Google ScholarDigital Library
- R. Subramanyan and M. Krishnan. Empirical analysis of ck metrics for object-oriented design complexity: Implications for software defects. IEEE Transactions on Software Engineering, 29(4), April 2003. Google ScholarDigital Library
- F. Tsui, O. Karam, S. Duggins, and C. Bonja. On inter-method and intra-method object-otiented class cohesion. International Journal of Information Technologies and System Approach, 2(1), June 2009.Google ScholarCross Ref
- U.S. Department of Justice. Report of the department of justice's task force on intellectual property. Accessed 2012, October 2004.Google Scholar
- M. Webbink. A new paradigm for intellectual property rights in software. Duke Law & Technology Review, May 2005.Google Scholar
Index Terms
- Software protection with increased complexity and obfuscation
Recommendations
Managing software as intellectual property: protection and commercialization
AbstractThe article sets forth and analyzes the milestones of management of software as intellectual property. Software is assessed as an asset of the company's intellectual property (IP) portfolio. Protection options for a software program are specified, ...
Software obfuscation from crackers' viewpoint
ACST'06: Proceedings of the 2nd IASTED international conference on Advances in computer science and technologyVarious kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods ...
Hybrid static-dynamic attacks against software protection mechanisms
DRM '05: Proceedings of the 5th ACM workshop on Digital rights managementAdvances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The ...
Comments