The duties, skills, and knowledge of software architects

P Clements, R Kazman, M Klein… - 2007 Working IEEE …, 2007 - ieeexplore.ieee.org
This paper focuses on the human aspects of architecting software-in particular, the duties,
skills, and knowledge of software architects. We present the results of a survey of …

A code obfuscation technique to prevent reverse engineering

AK Dalai, SS Das, SK Jena - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Reverse engineering is the process of decompiling and disassembling the executables to
recover the source code/assembly code embedded within it. While reverse engineering is …

Software piracy forensics: A proposal for incorporating dead codes and other programming blunders as important evidence in AFC test

PV Bhattathiripad - 2012 ieee 36th annual computer software …, 2012 - ieeexplore.ieee.org
Dead code, which is not uncommon in software engineering, is an unexplored area in
software piracy forensics. This paper primarily investigates the forensic importance of all …

Code Obfuscation Using Code Splitting with Self-Modifying Code

SS Das - 2014 - ethesis.nitrkl.ac.in
Code Obfuscation is a protection technique that transforms the software into a semantically
equivalent one which is strenuous to reverse engineer. As a part of software protection and …

Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With The Dated AFC Test

VP Bhattathiripad - Journal of Digital Forensics, Security and …, 2014 - commons.erau.edu
This paper presents a new development in the forensics of software copyright through a
juxtaposed comparison between the proven AFC test and the recent POSAR test, the two …

Some Additional Factors for Inclusion in Software Copyright Infringement Forensics

I Forensics - 2014 - igi-global.com
This chapter takes upon itself the task of looking into and discussing the forensic importance
of some new features, which are not currently considered important but which need to be …