1.5 MB | 3 files | PDF, DOC
Using extensive sample code, this 58-page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking.
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Authors Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"
The attached Zip file includes:
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>
Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solve their Big Data problems. ... More >>
This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and working with slides, keyboard shortcuts, formatting, transitions and working with images and multimedia files. ... More >>