Surreptitious software obfuscation, watermarking, and tamperproofing for software protection

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Tech...

Descripción completa

Detalles Bibliográficos
Autor principal: Collberg, Christian (-)
Otros Autores: Nagra, Jasvir
Formato: Libro electrónico
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley 2009, c2010.
Edición:1st edition
Colección:Addison-Wesley software security series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627629106719
Tabla de Contenidos:
  • What is surreptitious software?
  • Methods of attack and defense
  • Program analysis
  • Code obfuscation
  • Obfuscation theory
  • Dynamic obfuscation
  • Software tamperproofing
  • Software watermarking
  • Dynamic watermarking
  • Software similarity analysis
  • Hardware for protecting software.