skip to main content
10.1145/2184512.2184595acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
poster

Software protection with increased complexity and obfuscation

Authors Info & Claims
Published:29 March 2012Publication History

ABSTRACT

While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourcing partners will become competitors in the future. In this paper we propose an approach to protect proprietary software by increasing its complexity, to prevent reverse engineering. We introduce four Conjectures for protecting our software through obfuscation and explore and provide rationale for why these four Conjectures make logical sense and should be considered for further formal experiments.

References

  1. C. Collberg, J. Davidson, R. Giacobazzi, Y. X. Gu, A. Herzberg, and F. Wang. Toward digital asset protection. IEEE Intelligent Systems, November/December 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. H. Halstead. Elements of Software Science. Elsevier, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. McCabe. A complexity measure. IEEE Transactions on Software Engineering, 2(4), December 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Subramanyan and M. Krishnan. Empirical analysis of ck metrics for object-oriented design complexity: Implications for software defects. IEEE Transactions on Software Engineering, 29(4), April 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Tsui, O. Karam, S. Duggins, and C. Bonja. On inter-method and intra-method object-otiented class cohesion. International Journal of Information Technologies and System Approach, 2(1), June 2009.Google ScholarGoogle ScholarCross RefCross Ref
  6. U.S. Department of Justice. Report of the department of justice's task force on intellectual property. Accessed 2012, October 2004.Google ScholarGoogle Scholar
  7. M. Webbink. A new paradigm for intellectual property rights in software. Duke Law & Technology Review, May 2005.Google ScholarGoogle Scholar

Index Terms

  1. Software protection with increased complexity and obfuscation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM-SE '12: Proceedings of the 50th Annual Southeast Regional Conference
      March 2012
      424 pages
      ISBN:9781450312035
      DOI:10.1145/2184512

      Copyright © 2012 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 March 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate178of377submissions,47%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader