AT&T, Network CTO, Middletown, New Jersey, United States.
World Journal of Advanced Research and Reviews, 2026, 29(01), 734-737
Article DOI: 10.30574/wjarr.2026.29.1.0079
Received on 04 December 2025; revised on 10 January 2026; accepted on 13 January 2026
Software vendors face persistent threats from reverse-engineering, tampering, and IP theft once code is distributed. We present a method and system that selectively encrypts critical functions in the source code, ships encrypted function artifacts separately, and decrypts & executes those functions only in memory at runtime with integrity checks and immediate memory-wipe cleanup. This approach combines fine-grained protection, tamper detection, and ephemeral execution to raise the bar for attackers while remaining language- and platform-agnostic.
Secure Runtime Encryption; Critical Function Encryption; Source-Code Protection; Intellectual Property (IP) Protection; Code Obfuscation; Runtime Decryption; Hardware-Assisted Encryption; White-Box Cryptography; Memory Protection; Software Anti-Tamper; Dynamic Code Loading; Side-Channel Attack Resistance; Embedding Security Policies; Digital Rights Management; Homomorphic Encryption
Get Your e Certificate of Publication using below link
Preview Article PDF
Amar Gurajapu and Anurag Agarwal. Secure Runtime Encryption of Critical Source-Code Functions for IP Protection. World Journal of Advanced Research and Reviews, 2026, 29(01), 734-737; DOI: 10.30574/wjarr.2026.29.1.0079;
Copyright © 2026 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0