Cargando…

Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /

"This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing professional in software protection."--Mikhail Atallah, Distinguished Professor of Computer Science at Purdue Uni...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Collberg, Christian
Otros Autores: Nagra, Jasvir
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2009, ©2010.
Colección:Addison-Wesley software security series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • What is surreptitious software?
  • Methods of attack and defense
  • Program analysis
  • Code obfuscation
  • Obfuscation theory
  • Dynamic obfuscation
  • Software tamperproofing
  • Software watermarking
  • Dynamic watermarking
  • Software similarity analysis
  • Hardware for protecting software.