dcsimg

Find an IT Download

What is Surreptitious Software? Book Excerpt

Using extensive sample code, this 58-page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking.


1.5 MB | 3 files | null PDF,null DOC

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.

Authors Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Surreptitious Software Excerpt.pdf

Related IT DOWNLOADS

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More

Recent IT Downloads
Big Data: Storage, Sharing, and Security

Chapter 2 focuses on answering questions faced by individuals interested in using storage or d...Read More