Performance analysis of binary code protection

David M. Nicol, Hamed Okhravi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software protection technology seeks to prevent unauthorized observation or use of applications. Cryptography can be used to provide such protection, but imposes a potentially significant additional computation load. This paper examines the performance impact of two software protection techniques. We develop an analytic model and validate it using a detailed discrete-event simulator applied to memory reference traces of well-known benchmark programs. We find that even though the added workload may be large, that impact is often dominated by inherent costs of disk activity.

Original languageEnglish (US)
Title of host publicationProceedings of the 2005 Winter Simulation Conference
Pages601-610
Number of pages10
DOIs
StatePublished - 2005
Event2005 Winter Simulation Conference - Orlando, FL, United States
Duration: Dec 4 2005Dec 7 2005

Publication series

NameProceedings - Winter Simulation Conference
Volume2005
ISSN (Print)0891-7736

Other

Other2005 Winter Simulation Conference
Country/TerritoryUnited States
CityOrlando, FL
Period12/4/0512/7/05

ASJC Scopus subject areas

  • Software
  • Modeling and Simulation
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Performance analysis of binary code protection'. Together they form a unique fingerprint.

Cite this