1.5 MB | 3 files | PDF, DOC
Using extensive sample code, this 58-page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking.
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Authors Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"
The attached Zip file includes:
This Microsoft Office 365 Cheat Sheet covers basic setup and navigating the web-based service, collaborating on projects, creating and editing documents and using OneDrive. ... More >>
This excerpt focuses on the crowd and the traits of a crowd that make it relevant to be engaged at various stages in the software engineering process. ... More >>
This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management. ... More >>