Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering
First Claim
1. A method for protecting application software from reverse engineering or tampering, comprising:
- seeding said application software with sneak circuits based on performance indicators;
running said application software in test mode after said seeding;
analyzing performance indicators and protection indicators of said application software while running said application software in said test mode;
modifying seeding if said performance indicators and said protection indicators reach a predetermined tradeoff value; and
inserting active protection code in said application software.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and program for protecting applications software from unauthorized access, reverse engineering or tampering, is disclosed. Protection of the application software may be accomplished by seeding the application software with sneak circuits based on performance indicators; running the application software in test mode to analyze performance indicators versus protection indicators of the application software; modifying seeding if the performance indicators and the protection indicators reach a predetermined tradeoff value; and inserting active protection code in the application software. Additional protection can be accomplished by executing a protected version of the application software in normal mode and collecting forensics data while executing the protected version.
33 Citations
56 Claims
-
1. A method for protecting application software from reverse engineering or tampering, comprising:
-
seeding said application software with sneak circuits based on performance indicators;
running said application software in test mode after said seeding;
analyzing performance indicators and protection indicators of said application software while running said application software in said test mode;
modifying seeding if said performance indicators and said protection indicators reach a predetermined tradeoff value; and
inserting active protection code in said application software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program stored on a computer readable medium for programming a computer to protect application software from reverse engineering or tampering, the computer program comprising:
-
a computer code segment for seeding said application software with sneak circuits based on performance indicators;
a computer code segment for running said application software in test mode after said seeding, the running for analyzing said performance indicators and protection indicators of said application software;
a computer code segment for modifying seeding if said performance indicators and said protection indicators reach a predetermined tradeoff value; and
a computer code segment for inserting active protection code in said application software. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for protecting application software from reverse engineering or tampering, comprising:
-
a seeding module for augmenting said application software with sneak circuits based on performance indicators;
a running module for analyzing said performance indicators and protection indicators of said application software in test mode after said seeding;
a modifying module for updating seeding if said performance indicators and said protection indicators reach a predetermined tradeoff value; and
a protecting module for inserting active protection code in said application software. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A system for protecting application software from reverse engineering or tampering, comprising:
-
means for seeding said application software with sneak circuits based on performance indicators;
means for analyzing performance indicators and protection indicators of said application software in test mode after said seeding;
means for modifying seeding if said performance indicators and said protection indicators reach a predetermined tradeoff value; and
means for inserting active protection code in said application software. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification