Surreptitious Software: Obfuscation, Watermarking, and by Christian Collberg

By Christian Collberg

“This ebook provides thorough, scholarly assurance of a space of growing to be value in desktop defense and is a ‘must have’ for each researcher, pupil, and training specialist in software program protection.”
    —Mikhail Atallah, exotic Professor of desktop technological know-how at Purdue University

Theory, innovations, and instruments for battling software program Piracy, Tampering, and Malicious opposite Engineering

The final decade has obvious major development within the improvement of strategies for resisting software program piracy and tampering. those strategies are essential for software program builders looking to shield very important highbrow estate. Surreptitious Software is the 1st authoritative, accomplished source for researchers, builders, and scholars who are looking to comprehend those methods, the extent of defense they have the funds for, and the functionality  penalty they incur.

Christian Collberg and Jasvir Nagra compile recommendations drawn from similar components of laptop technology, together with cryptography, steganography, watermarking, software program metrics, opposite engineering, and compiler optimization. utilizing vast pattern code, they express readers easy methods to enforce safety schemes starting from code obfuscation and software program fingerprinting to tamperproofing and birthmarking, and talk about the theoretical and functional boundaries of those thoughts.

Coverage includes

  • Mastering suggestions that either attackers and defenders use to investigate programs
  • Using code obfuscation to make software program tougher to research and understand
  • Fingerprinting software program to spot its writer and to track software program pirates
  • Tamperproofing software program utilizing guards that realize and reply to unlawful changes of code and data
  • Strengthening content material safeguard via dynamic watermarking and dynamic obfuscation
  • Detecting code robbery through software program similarity research and birthmarking algorithms
  • Using innovations to guard software program and media opposed to piracy and tampering
  • Detecting software program tampering in dispensed system
  • Understanding the theoretical limits of code obfuscation

Show description

Read or Download Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection PDF

Similar information theory books

Theory of Information: Fundamentality, Diversity and Unification (World Scientific Series in Information Studies)

This distinctive quantity provides a brand new method - the overall conception of knowledge - to clinical figuring out of knowledge phenomena. in response to an intensive research of knowledge approaches in nature, know-how, and society, in addition to at the major instructions in details idea, this conception synthesizes current instructions right into a unified procedure.

Managing Economies, Trade and International Business

The present part of globalization and the elevated interconnectedness of economies via exchange have stimulated the administration and development charges of economies and likewise the aggressive and managerial matters for companies. This booklet specializes in 3 major matters – monetary progress and sustainable improvement; alternate, legislations and legislation; and aggressive and managerial matters in overseas enterprise – from a multidisciplinary, transversal and eclectic point of view.

Efficient Secure Two-Party Protocols: Techniques and Constructions

The authors current a finished examine of effective protocols and methods for safe two-party computation – either normal buildings that may be used to soundly compute any performance, and protocols for particular difficulties of curiosity. The e-book makes a speciality of ideas for developing effective protocols and proving them safe.

Information Theory and Best Practices in the IT Industry

​​​The value of benchmarking within the provider quarter is easily well-known because it is helping in non-stop development in items and paintings techniques. via benchmarking, businesses have strived to enforce most sensible practices so one can stay aggressive within the product- industry during which they function. even if stories on benchmarking, quite within the software program improvement region, have ignored utilizing a number of variables and accordingly haven't been as finished.

Additional info for Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection

Sample text

As the field becomes more mainstream, we can expect journals, workshops, and conferences dedicated exclusively to surreptitious software, but this has yet to happen. The military has also spent much effort (and taxpayer money) on surreptitious software research. For example, the patent [96] held on Cousot’s software watermarking algorithm [95] is assigned to the French Thales group, the ninth-largest defense contractor in the world. S. S. Army Project Executive Offices (PEOs) and Project Managers (PMs) are now charged with executing Army and Department of Defense (DoD) AT policies in the design and implementation of their systems.

Here’s another quote from the DoD [115]: The Software Protection Initiative (SPI) is an undertaking of the Department of Defense (DoD) to develop and deploy technologies to secure special-purpose computer programs containing information critical to DoD weapon programs. SPI offers a novel approach to protecting high value computer programs. It doesn’t secure the computer or the network. Instead it empowers a single computer program to secure itself. This approach promises to significantly improve DoD’s Information Assurance posture.

In the second step, we’ve considered each basic block once, and have gathered some information. After a basic block has executed the statement x = 3, for example, it is clear that x must have the value 3. Also, if a basic block doesn’t change the value of x, then x must have the same value after the block executes as it did before. When control can flow into a basic block from two different directions and we’ve computed that x has the same value on both paths, then we can safely assume that it will always have that value at the entry to the block.

Download PDF sample

Rated 4.26 of 5 – based on 14 votes