International Business Machines Corporation
Preventing software application tampering
Last updated:
Abstract:
Systems and methods for preventing software application tampering are disclosed. 1. In embodiments, a computer-implemented method includes: identifying, by a computing device, an IP related software code segment of a software application; segregating, by the computing device, the IP related software code segment into one or more native code clusters and one or more non-native code clusters; refactoring, by the computing device, the one or more non-native code clusters into one or more stand-alone portable components (SPCs); determining, by the computing device, code migration scores for the one or more SPCs; and determining, by the computing device, select SPCs from the one or more SPCs to migrate to a remote security server based on the code migration scores.
Utility
5 Sep 2018
27 Jul 2021