Show simple item record

dc.contributor.authorWang, Ce
dc.contributor.authorSuo, Siyang
dc.date.accessioned2015-03-30T12:28:15Z
dc.date.available2015-03-30T12:28:15Z
dc.date.issued2015-03-30
dc.identifier.urihttp://hdl.handle.net/2077/38585
dc.description.abstractReverse engineering of software binary codes have reached an advanced state that can be effectively used by developers and attackers alike. In recent years, reverse engineering for harmful purpose appears to be commonplace and it has significant cost influence on industry sales and profitability. To accomplish this, the issues of useful software protection are becoming more and more popular. This paper covers the working process of reverse engineering and the list of existing software protection technologies, we also implemented interview study to collect the result of software protection using situation in real companies. The aim of this study is to provide useful information about practical software protection technologies to against malicious reverse engineering. Furthermore, we suggest several software protection technologies to against malicious reverse engineering.sv
dc.language.isoengsv
dc.subjectreverse engineeringsv
dc.subjectsoftware protection.sv
dc.titleThe practical defending of malicious reverse engineeringsv
dc.typetext
dc.setspec.uppsokTechnology
dc.type.uppsokM2
dc.contributor.departmentGöteborgs universitet/Institutionen för data- och informationsteknikswe
dc.contributor.departmentUniversity of Gothenburg/Department of Computer Science and Engineeringeng
dc.type.degreeStudent essay


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record