mostraligabue
» » Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection

ePub Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection download

by Jasvir Nagra,Christian Collberg

ePub Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection download
Author:
Jasvir Nagra,Christian Collberg
ISBN13:
978-0321549259
ISBN:
0321549252
Language:
Publisher:
Addison-Wesley Professional; 1 edition (August 3, 2009)
Category:
Subcategory:
Programming
ePub file:
1643 kb
Fb2 file:
1333 kb
Other formats:
lrf lrf docx lit
Rating:
4.3
Votes:
877

Remote Tamperproofing Section . Discussion Chapter 8. Software Watermarking Section . Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

Remote Tamperproofing Section . History and Applications Section . Watermarking Software Section . Definitions Section . Watermarking by Permutation Section . Tamperproofing Watermarks Section . Improving Resilience Section . Improving Stealth Section .

software similarity analysis and birthmarking algorithms Using software to defend against hardware exploits Whatever your role in protecting software . Christian Collberg, Myles, Jasvir Nagra.

software similarity analysis and birthmarking algorithms Using software to defend against hardware exploits Whatever your role in protecting software or content, it's harder than ever to stay ahead of the crackers and pirates. You can't do it without the tools, techniques, and code you'll find inSurreptitious Software.

Surreptitious Software book. Goodreads helps you keep track of books you want to read. Start by marking Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection as Want to Read: Want to Read savin. ant to Read.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques. Mastering techniques that both attackers and defenders use to analyze programs. Using code obfuscation to make.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science . Chapter 8: Software Watermarking 467 . History and Applications 468 . Watermarking Software 478 . Definitions 480 . Watermarking by Permutation 486 . arks 494 . Improving Resilience 498 . Improving Stealth 505 . Steganographic Embeddings 522 . SplittingWatermark Integers 526 . 0 Graph Codecs 533 . 1 Discussion 537.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization

Электронная книга "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection", Jasvir Nagra, Christian Collberg.

Электронная книга "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection", Jasvir Nagra, Christian Collberg.

A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code.

How to make your software tamperproof About the authors: Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including.

How to make your software tamperproof. This is a chapter excerpt from: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection About the authors: Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization.

Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection. C Collberg, S Kobourov, J Nagra, J Pitts, K Wampler. Pearson Education, 2009. A system for graph-based visualization of the evolution of software. Proceedings of the 2003 ACM symposium on Software visualization, 77-ff, 2003. A Taly, Ú Erlingsson, JC Mitchell, MS Miller, J Nagra. 2011 IEEE Symposium on Security and Privacy, 363-378, 2011. Threading software watermarks. J Nagra, C Thomborson.

Coupon
  • Very good, maybe the best resource for protecting your own software releases.
    A must read, with a good price!
    Thank you!

  • This book was very interesting to me. I really don't work in such a way that I would have a need to deploy my own software for money and therefore need to worry about hiding the details of my code, but it was an aspect of computer security I didn't know much about until I sat down with this book. The book is not about trying to keep people out of your computer networks, but it is about keeping unauthorized users from executing your code and about disabling the analysis of your code by those who might want to extract details about some algorithm for the purpose of copying it.

    I thought that the algorithms involved were very well explained and code snippets were shown to illustrate key concepts. The author employs widely used languages such as PERL for his examples. Commercial products are mentioned when applicable. I really enjoyed the sections on steganography and watermarking - these sections contain the clearest descriptions of the key algorithms involved that I've seen. I had only seen this subject mentioned before in the context of information hiding inside of an image, and the author did a great job of applying it to the conditional hiding of software details.

    I'd highly recommend this especially to anyone involved in securing software, but even if you are not it is a good exercise in "stretching your brain" on a timely computer science topic. The reader should already be an able programmer in a number of the more common languages (PERL, Java, C) and you should probably have a background in computer science equivalent to a four year degree in order to get the most from this book. The table of contents are not currently shown in the product information, so I include that next.

    Chapter 1. What Is Surreptitious Software?
    Section 1.1. Setting the Scene
    Section 1.2. Attack and Defense
    Section 1.3. Program Analysis
    Section 1.4. Code Obfuscation
    Section 1.5. Tamperproofing
    Section 1.6. Software Watermarking
    Section 1.7. Software Similarity
    Section 1.8. Hardware-Based Protection Techniques
    Section 1.9. Discussion
    Section 1.10. Notation
    Chapter 2. Methods of Attack and Defense
    Section 2.1. Attack Strategies
    Section 2.2. Defense Strategies
    Section 2.3. Discussion
    Chapter 3. Program Analysis
    Section 3.1. Static Analysis
    Section 3.2. Dynamic Analysis
    Section 3.3. Reconstituting Source
    Section 3.4. Pragmatic Analysis
    Section 3.5. Discussion
    Chapter 4. Code Obfuscation
    Section 4.1. Semantics-Preserving Obfuscating Transformations
    Section 4.2. Definitions
    Section 4.3. Complicating Control Flow
    Section 4.4. Opaque Predicates
    Section 4.5. Data Encodings
    Section 4.6. Breaking Abstractions
    Section 4.7. Discussion
    Chapter 5. Obfuscation Theory
    Section 5.1. Definitions
    Section 5.2. Provably Secure Obfuscation: Possible or Impossible?
    Section 5.3. Provably Secure Obfuscation: It's Possible (Sometimes)!
    Section 5.4. Provably Secure Obfuscation: It's Impossible (Sometimes)!
    Section 5.5. Provably Secure Obfuscation: Can It Be Saved?
    Section 5.6. Discussion
    Chapter 6. Dynamic Obfuscation
    Section 6.1. Definitions
    Section 6.2. Moving Code Around
    Section 6.3. Encryption
    Section 6.4. Discussion
    Chapter 7. Software Tamperproofing
    Section 7.1. Definitions
    Section 7.2. Introspection
    Section 7.4. State Inspection
    Section 7.5. Remote Tamperproofing
    Section 7.6. Discussion
    Chapter 8. Software Watermarking
    Section 8.1. History and Applications
    Section 8.2. Watermarking Software
    Section 8.3. Definitions
    Section 8.4. Watermarking by Permutation
    Section 8.5. Tamperproofing Watermarks
    Section 8.6. Improving Resilience
    Section 8.7. Improving Stealth
    Section 8.8. Steganographic Embeddings
    Section 8.9. Splitting Watermark Integers
    Section 8.10. Graph Codecs
    Section 8.11. Discussion
    Chapter 9. Dynamic Watermarking
    Section 9.1. Algorithm WMCT: Exploiting Aliasing
    Section 9.2. Algorithm WMNT: Exploiting Parallelism
    Section 9.3. Algorithm WMCCDKHLSpaths: Expanding Execution Paths
    Section 9.4. Algorithm WMCCDKHLSbf: Tamperproofing Execution Paths
    Section 9.5. Discussion
    Chapter 10. Software Similarity Analysis
    Section 10.1. Applications
    Section 10.2. Definitions
    Section 10.3. k-gram-Based Analysis
    Section 10.4. API-Based Analysis
    Section 10.5. Tree-Based Analysis
    Section 10.6. Graph-Based Analysis
    Section 10.7. Metrics-Based Analysis
    Section 10.8. Discussion
    Chapter 11. Hardware for Protecting Software
    Section 11.1. Anti-Piracy by Physical Distribution
    Section 11.2. Authenticated Boot Using a Trusted Platform Module
    Section 11.3. Encrypted Execution
    Section 11.4. Attacks on Tamperproof Devices
    Section 11.5. Discussion

  • This book is part of Addison-Wesley's software security series (which I edit). Most of the books in the series are about how to build more secure software. By contrast, this book is about how to protect software.

    There are many resaons to protect software with watermarking, obfuscation, and tamperproofing. Perhaps your product needs protection from piracy (like a game, a book, or music). Perhaps your product involves top secret military ideas and may be captured by the enemy (like a predator drone shot down in Afghanistan). Whatever your reason for software protection might be, this book is the go to guide for protecting software.

    Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

    gem