File Name: surreptitious software obfuscation watermarking and tamperproofing .zip
Using extensive sample code, this page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking. The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property.
These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques. Coverage includes Mastering techniques that both attackers and defenders use to analyze programs Using code obfuscation to make software harder to analyze and understand Fingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and data Strengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithms Using hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed system Understanding the theoretical limits of code obfuscation. Post a Comment.
Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering , and tampering. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements. Unable to display preview. Download preview PDF. Skip to main content.
Search this site. Clark Scott. NET by Kathleen Dollard. Book by Dylan Teixeira. NET 4. EPUb by Serge Abiteboul. Brooks Jr.
Orders delivered to U. Learn more. View Larger Image. Register your product to gain access to bonus material or receive a coupon. The eBook requires no passwords or activation to read.
Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. Collberg and J. Collberg , J. Nagra Published in Addison-Wesley Software….
Он перечитал свою записку и положил на пол возле. То, что он собирался сделать, несомненно, было проявлением малодушия. Я умею добиваться своей цели, - подумал. Потом он подумал о вирусе, попавшем в ТРАНСТЕКСТ, о Дэвиде Беккере в Испании, о своих планах пристроить черный ход к Цифровой крепости. Он так много лгал, он так виноват. Стратмор знал, что это единственный способ избежать ответственности… единственный способ избежать позора.
Your email address will not be published. Required fields are marked *