dc.contributor.author | Wang, Ce | |
dc.contributor.author | Suo, Siyang | |
dc.date.accessioned | 2015-03-30T12:28:15Z | |
dc.date.available | 2015-03-30T12:28:15Z | |
dc.date.issued | 2015-03-30 | |
dc.identifier.uri | http://hdl.handle.net/2077/38585 | |
dc.description.abstract | Reverse engineering of software binary codes have reached an advanced state that can be effectively used by developers and attackers alike. In recent years, reverse engineering for harmful purpose appears to be commonplace and it has significant cost influence on industry sales and profitability. To accomplish this, the issues of useful software protection are becoming more and more popular.
This paper covers the working process of reverse engineering and the list of existing software protection technologies, we also implemented interview study to collect the result of software protection using situation in real companies. The aim of this study is to provide useful information about practical software protection technologies to against malicious reverse engineering. Furthermore, we suggest several software protection technologies to against malicious reverse engineering. | sv |
dc.language.iso | eng | sv |
dc.subject | reverse engineering | sv |
dc.subject | software protection. | sv |
dc.title | The practical defending of malicious reverse engineering | sv |
dc.type | text | |
dc.setspec.uppsok | Technology | |
dc.type.uppsok | M2 | |
dc.contributor.department | Göteborgs universitet/Institutionen för data- och informationsteknik | swe |
dc.contributor.department | University of Gothenburg/Department of Computer Science and Engineering | eng |
dc.type.degree | Student essay | |