Challenges and techniques for code protection in a distributed environment
Date Issued
2022-03
Author(s)
Ivica Pesovski
Katerina Zdravkova
Abstract
The digital transformation is impacting every
aspect of our everyday life. The recent social-distancing and
isolation measures accelerated the migration of many very
traditional processes to online operation. Different vendors
develop their own applications for diverse purposes, which
expose end-users to significant security risks. Source code
protection is crucial for making the internet world a secure
environment. This paper discusses code obfuscation,
white-box encryption, tamper-proofing, and diversification
techniques. The recommendations and discussions in this
article contribute toward ensuring a secure digital world.
Following them and comprehending their advantages and
disadvantages will enable the delivery of code that end users
will trust and use.
aspect of our everyday life. The recent social-distancing and
isolation measures accelerated the migration of many very
traditional processes to online operation. Different vendors
develop their own applications for diverse purposes, which
expose end-users to significant security risks. Source code
protection is crucial for making the internet world a secure
environment. This paper discusses code obfuscation,
white-box encryption, tamper-proofing, and diversification
techniques. The recommendations and discussions in this
article contribute toward ensuring a secure digital world.
Following them and comprehending their advantages and
disadvantages will enable the delivery of code that end users
will trust and use.
Subjects
File(s)![Thumbnail Image]()
Loading...
Name
Pesovski Zdravkova.pdf
Size
232.27 KB
Format
Adobe PDF
Checksum
(MD5):83813b86bbfcd809b028e71c485c1c2e
