TY - GEN
T1 - Performance analysis of binary code protection
AU - Nicol, David M.
AU - Okhravi, Hamed
PY - 2005
Y1 - 2005
N2 - Software protection technology seeks to prevent unauthorized observation or use of applications. Cryptography can be used to provide such protection, but imposes a potentially significant additional computation load. This paper examines the performance impact of two software protection techniques. We develop an analytic model and validate it using a detailed discrete-event simulator applied to memory reference traces of well-known benchmark programs. We find that even though the added workload may be large, that impact is often dominated by inherent costs of disk activity.
AB - Software protection technology seeks to prevent unauthorized observation or use of applications. Cryptography can be used to provide such protection, but imposes a potentially significant additional computation load. This paper examines the performance impact of two software protection techniques. We develop an analytic model and validate it using a detailed discrete-event simulator applied to memory reference traces of well-known benchmark programs. We find that even though the added workload may be large, that impact is often dominated by inherent costs of disk activity.
UR - http://www.scopus.com/inward/record.url?scp=33846683408&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33846683408&partnerID=8YFLogxK
U2 - 10.1109/WSC.2005.1574300
DO - 10.1109/WSC.2005.1574300
M3 - Conference contribution
AN - SCOPUS:33846683408
SN - 0780395204
SN - 9780780395206
T3 - Proceedings - Winter Simulation Conference
SP - 601
EP - 610
BT - Proceedings of the 2005 Winter Simulation Conference
T2 - 2005 Winter Simulation Conference
Y2 - 4 December 2005 through 7 December 2005
ER -