PROTECTING SOFTWARE
Methods and systems for generating a secured software application (108) involve receiving a source software application (100); identifying one or more sets of source instructions (102) within it and for each of the sets of source instructions (102) generating data (106) representative of the set of...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Methods and systems for generating a secured software application (108) involve receiving a source software application (100); identifying one or more sets of source instructions (102) within it and for each of the sets of source instructions (102) generating data (106) representative of the set of source instructions. A secured software application (108) is generated having the data (106) and a runtime engine (114). The runtime engine (114) has code for processing the data (106), during a runtime of the secured software application (108), to generate (213), for each of the sets of source instructions (102), a respective plurality of generations of a respective set of runtime instructions. Each generation of the respective set of runtime instructions is functionally equivalent to the respective set of source instructions and at least two of the generations of the respective set of runtime instructions differ from each other. |
---|