Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/24341
DC FieldValueLanguage
dc.contributor.authorIvica Pesovskien_US
dc.contributor.authorKaterina Zdravkovaen_US
dc.date.accessioned2022-11-14T07:41:02Z-
dc.date.available2022-11-14T07:41:02Z-
dc.date.issued2022-03-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/24341-
dc.description.abstractThe digital transformation is impacting every aspect of our everyday life. The recent social-distancing and isolation measures accelerated the migration of many very traditional processes to online operation. Different vendors develop their own applications for diverse purposes, which expose end-users to significant security risks. Source code protection is crucial for making the internet world a secure environment. This paper discusses code obfuscation, white-box encryption, tamper-proofing, and diversification techniques. The recommendations and discussions in this article contribute toward ensuring a secure digital world. Following them and comprehending their advantages and disadvantages will enable the delivery of code that end users will trust and use.en_US
dc.language.isoenen_US
dc.subjectbrowser extensions, source code protection, code obfuscation, white-box encryption, tamper-proofing, code diversification, cybersecurityen_US
dc.titleChallenges and techniques for code protection in a distributed environmenten_US
dc.typeProceeding articleen_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Опис SizeFormat 
Pesovski Zdravkova.pdf232.27 kBAdobe PDFView/Open
Прикажи едноставен запис

Page view(s)

40
checked on 18.7.2024

Download(s)

14
checked on 18.7.2024

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.