Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra


Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra PDF, ePub eBook D0wnl0ad
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University
Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property.
Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
Coverage includes
- Mastering techniques that both attackers and defenders use to analyze programs
- Using code obfuscation to make software harder to analyze and understand
- Fingerprinting software to identify its author and to trace software pirates
- Tamperproofing software using guards that detect and respond to illegal modifications of code and data
- Strengthening content protection through dynamic watermarking and dynamic obfuscation
- Detecting code theft via software similarity analysis and birthmarking algorithms
- Using hardware techniques to defend software and media against piracy and tampering
- Detecting software tampering in distributed system
- Understanding the theoretical limits of code obfuscation
From reader reviews:Michael Collins:
The knowledge that you get from Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection is a more deep you rooting the information that hide in the words the more you get enthusiastic about reading it. It does not mean that this book is hard to know but Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection giving you enjoyment feeling of reading. The article writer conveys their point in specific way that can be understood through anyone who read the item because the author of this reserve is well-known enough. This book also makes your own vocabulary increase well. That makes it easy to understand then can go with you, both in printed or e-book style are available. We highly recommend you for having this kind of Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection instantly.
Dolores Wade:
Don't be worry for anyone who is afraid that this book can filled the space in your house, you may have it in e-book technique, more simple and reachable. This Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection can give you a lot of close friends because by you considering this one book you have factor that they don't and make anyone more like an interesting person. That book can be one of one step for you to get success. This publication offer you information that perhaps your friend doesn't recognize, by knowing more than different make you to be great men and women. So , why hesitate? Let me have Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection.
Michael Mitchell:
A lot of book has printed but it takes a different approach. You can get it by internet on social media. You can choose the most beneficial book for you, science, witty, novel, or whatever by simply searching from it. It is called of book Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection. You can contribute your knowledge by it. Without making the printed book, it may add your knowledge and make you actually happier to read. It is most essential that, you must aware about book. It can bring you from one destination for a other place.

Read Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra for online ebook
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra Free PDF d0wnl0ad, audio books, books to read, good books to read, cheap books, good books, online books, books online, book reviews epub, read books online, books to read online, online library, greatbooks to read, PDF best books to read, top books to read Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra books to read online.
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra Doc
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra Mobipocket
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra EPub