期刊文献+

软件防篡改技术研究 被引量:8

Software Tamper-proofing Research
下载PDF
导出
摘要 随着软件产业的不断发展,对软件知识产权的保护已成为一个引人关注的重要问题。目前,对知识产权的攻击方式主要有三种:软件盗版(Software Piracy)、逆向工程(Reserve Engineering)、代码篡改(Code Tamper),对应的防御措施主要有软件水印技术(Software Watermarking)、代码模糊(Code Obfuscation)、软件防篡改(Software Tamper-proofing)。此外,还有多样性(Diversity)、时间限制模式(Time-limited Scheme)等方法。详细介绍了软件防篡改技术,对它的分类、现状、现存机制以及下一步的发展方向做了较深入的分析。 With the development of software industry,the protecting of software intellectual property right has becoming an important problem to catch our eyes. At present, there are three main attacking manners:Software Piracy,Reserve Engineering and Code Tamper. And the corresponding recovery manners are:Software Watermarking ,Code Obfuscating and Software Tamper-proofing .Besides ,there are other manners ,such as Diversity ,Time--limited Scheme and so on .In this paper,we will introduce about the manner of Software Tamper--proofing ,and deeply analysis its class,its actuality as well as its further developing direction.
出处 《计算机安全》 2009年第1期34-37,共4页 Network & Computer Security
关键词 软件保护 防篡改 完整性检测 software protection tamper-proofing integrity checking
  • 相关文献

参考文献2

二级参考文献4

  • 1高宏.可信计算机安全技术的开发[J].中国信息导报,2004(7):58-60. 被引量:2
  • 2C.S. Collberg, C.Thomborson. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection[EB/OL]. IEEE Tans. Software Eng., 2002,(8): 735~746.
  • 3H.Chang, M.J.Atallah. Protecting Software Code by Guards[M]. Proc. ACM Workshop Security and Privacy in Digital rights management, ACM Press, 2001. 160~ 175.
  • 4(美)Cem Kaner,等.计算机软件测试:2版[M].王锋,等译.北京:机械工业出版社/中信出版社,2004.

共引文献6

同被引文献57

引证文献8

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部