Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/52299
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLim, Hwee.
dc.date.accessioned2013-05-06T01:16:05Z
dc.date.available2013-05-06T01:16:05Z
dc.date.copyright2013en_US
dc.date.issued2013
dc.identifier.urihttp://hdl.handle.net/10356/52299
dc.description.abstractAlthough several forms of software of software protection exist now, many software developers still face the threat of losing their possibly proprietary source codes or algorithms to their rivals. One of the more common threats is Reverse Engineering. Reverse Engineering tools can be easily found on the internet or bought from the commercial market. With this in mind, software developers are forced to practice software protection, with the level of protection being proportionate to the costs they are willing to pay. This project report will discuss Software Obfuscation, which is one of the main techniques for preventing Reverse Engineering. In Software Obfuscation, there are various general techniques that apply to all programming languages, and a couple of specific techniques for each programming language. Several general techniques will be shown in this project report followed by specific techniques for the main targeted programming language, which is Java.en_US
dc.format.extent70 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Computer science and engineering::Dataen_US
dc.titleSoftware protection system – Ien_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorSabu Emmanuelen_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
SCE12-0258.pdf
  Restricted Access
2.49 MBAdobe PDFView/Open

Page view(s) 20

154
checked on Oct 24, 2020

Download(s) 20

15
checked on Oct 24, 2020

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.