1.5 MB | 3 files | PDF, DOC
Using extensive sample code, this 58-page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking.
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Authors Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"
The attached Zip file includes:
In this excerpt from chapter 9, readers are provided on overview of the NoSQL world, exploring the recent advancements and the new approaches of Web-scale data management. ... More >>
This paper describes pitfalls, issues, and methodology for measuring software performance, and urges the reader to measure the right performance the right way. ... More >>
“Getting Innovation Right: How Leaders Leverage Inflection Points to Drive Success,” written by Seth Kahan, reveals how your company can secure real traction and growth in the marketplace. ... More >>