Surreptitious software obfuscation, watermarking, and tamperproofing for software protection
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Tech...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Addison-Wesley
2009, c2010.
|
Edición: | 1st edition |
Colección: | Addison-Wesley software security series.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627629106719 |
Tabla de Contenidos:
- What is surreptitious software?
- Methods of attack and defense
- Program analysis
- Code obfuscation
- Obfuscation theory
- Dynamic obfuscation
- Software tamperproofing
- Software watermarking
- Dynamic watermarking
- Software similarity analysis
- Hardware for protecting software.