Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ [u.a.]
Addison-Wesley
2010
|
Ausgabe: | 1. print. |
Schriftenreihe: | Addison-Wesley Software security series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXVII, 748 S. graph. Darst. 24cm |
ISBN: | 0321549252 9780321549259 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039161510 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 110727s2010 d||| |||| 00||| eng d | ||
015 | |a GBA941851 |2 dnb | ||
016 | 7 | |a 015169897 |2 DE-101 | |
020 | |a 0321549252 |c (pbk) : £35.99 |9 0-321-54925-2 | ||
020 | |a 9780321549259 |9 978-0-321-54925-9 | ||
035 | |a (OCoLC)729926272 | ||
035 | |a (DE-599)HBZHT016102697 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Collberg, Christian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Surreptitious software |b obfuscation, watermarking, and tamperproofing for software protection |c Christian Collberg ; Jasvir Nagra |
250 | |a 1. print. | ||
264 | 1 | |a Upper Saddle River, NJ [u.a.] |b Addison-Wesley |c 2010 | |
300 | |a XXVII, 748 S. |b graph. Darst. |c 24cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Addison-Wesley Software security series | |
500 | |a Includes bibliographical references and index | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nagra, Jasvir |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024178996&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024178996 |
Datensatz im Suchindex
_version_ | 1804148010444128256 |
---|---|
adam_text | Titel: Surreptitious software
Autor: Collberg, Christian
Jahr: 2010
Contents
Preface xv
About the Authors xxv
Acknowledgments xxvii
1 What Is Surreptitious Software? 1
1.1 Setting the Scene 1
1.2 Attack and Defense 6
1.3 Program Analysis 7
1.3.1 A Simple Reverse Engineering Example 9
1.4 Code Obfuscation 13
1.4.1 Applications of Code Obfuscation 16
1.4.2 Obfuscating Transformations 20
1.4.3 Black Hat Code Obfuscation 26
1.5 Tamperproofing 32
1.5.1 Applications of Tamperproofing 33
1.5.2 An Example 35
1.6 Software Watermarking 36
1.6.1 An Example 38
1.6.2 Attacks on Watermarking Systems 41
1.7 Software Similarity 43
1.7.1 Plagiarism 43
1.7.2 Software Forensics 44
1.7.3 Birthmarking 45
1.7.4 A Birthmarking Example 47
1.8 Hardware-Based Protection Techniques 49
1.8.1 Distribution with Physical Token 49
1.8.2 Tying the Program to the CPU 50
1.8.3 Ensuring Safe Execution Environment 51
1.8.4 Encrypted Execution 52
1.8.5 Physical Barriers 54
VII
Vlll
Contents
1.9 Discussion 55
1.9.1 Reasons to Use Software Protection ... 55
1.9.2 ... and Reasons Not To 56
1.9.3 So Which Algorithms Should I Use? 57
1.10 Notation 58
2 Methods of Attack and Defense 59
2.1 Attack Strategies 60
2.1.1 A Prototypical Cracking Target 61
2.1.2 What s the Adversary s Motivation? 63
2.1.3 What Does the Adversary Get to Crack? 65
2.1.4 What s the Adversary s Attack Methodology? 68
2.1.5 What Tools Does the Adversary Use? 72
2.1.6 What Techniques Does the Adversary Use? 72
2.1.7 Discussion 83
2.2 Defense Strategies 86
2.2.1 Notation 87
2.2.2 The cover Primitive 90
2.2.3 The duplicate Primitive 93
2.2.4 The split and merge Primitives 96
2.2.5 The reorder Primitive 100
2.2.6 The map Primitive 101
2.2.7 The indirect Primitive 104
2.2.8 The mimic Primitive 106
2.2.9 The advertise Primitive 108
2.2.10 T z detect-respond Primitive 110
2.2.11 The dynamic Primitive 112
2.2.12 Discussion 113
2.3 Discussion 114
2.3.1 What Do We Need from Attack and Defense Models? 114
2.3.2 How Do We Use the Models to Devise Algorithms? 115
3 Program Analysis 117
3.1 Static Analysis 118
3.1.1 Control Flow Analysis 119
3.1.2 Data How Analysis 127
3.1.3 Data Dependence Analysis 132
3.1.4 Alias Analysis 134
3.1.5 Slicing 141
3.1.6 Abstract Interpretation 143
3.2 Dynamic Analysis 145
3.2.1 Debugging 146
3.2.2 Profiling 161
Contents ix
3.2.3 Tracing 163
3.2.4 Emulation 168
3.3 Reconstituting Source 170
3.3.1 Disassembly 172
3.3.2 Decompilation 180
3.4 Pragmatic Analysis 190
3.4.1 Style Metrics 191
3.4.2 Software Complexity Metrics 193
3.4.3 Software Visualization 195
3.5 Discussion 198
4 Code Obfuscation 201
4.1 Semantics-Preserving Obfuscating Transformations 202
4.1.1 Algorithm OBFCF: Diversifying Transformations 203
4.1.2 Algorithm OBFTP: Identifier Renaming 209
4.1.3 Obfuscation Executives 212
4.2 Definitions 217
4.2.1 Potent Obfuscating Transformations 219
4.2.2 Efficient Obfuscating Transformations 222
4.2.3 Stealth 222
4.2.4 Other Definitions 224
4.3 Complicating Control Flow 225
4.3.1 Opaque Expressions 225
4.3.2 Algorithm OBFWHKD: Control-Flow Flattening 226
4.3.3 Introducing Aliasing 229
4.3.4 Algorithm OBFCTJbogus: Inserting Bogus Control Flow 235
4.3.5 Algorithm OBFLDK: Jumps Through Branch Functions 239
4.3.6 Attacks 242
4.4 Opaque Predicates 246
4.4.1 Algorithm OBFCT) pointer - Opaque Predicates
from Pointer Aliasing 247
4.4.2 OBFWHKD0pa4Ue: Opaque Values from Array Aliasing 250
4.4.3 Algorithm OBFCT)thread- Opaque Predicates
from Concurrency 251
4.4.4 Breaking Opaque Predicates 253
4.5 Data Encodings 258
4.5.1 Encoding Integers 261
4.5.2 Encoding Booleans 266
4.5.3 Encoding Literal Data 269
4.5.4 Encoding Arrays 272
4.6 Breaking Abstractions 277
4.6.1 Algorithm OBFWC^g: Merging Function Signatures 277
4.6.2 Algorithm OBFCT]^: Splitting and Merging Classes 279
Contents
4.6.3 Algorithm OBFDMRVSL: Destroying High-Level
Structures 281
4.6.4 Algorithm OBFAJV: Modifying Instruction Encodings 293
4.7 Discussion 298
5 Obfuscation Theory 301
5.1 Definitions 304
5.2 Provably Secure Obfuscation: Possible or Impossible? 307
5.2.1 Turing s Halting Problem 308
5.2.2 Algorithm REAA: De-obfuscating Programs 311
5.3 Provably Secure Obfuscation: It s Possible (Sometimes)! 313
5.3.1 Algorithm OBFLBS: Obfuscating with Point Functions 314
5.3.2 Algorithm OBFNS: Obfuscating Databases 322
5.3.3 Algorithm OBFPP: Homomorphic Encryption 324
5.3.4 Algorithm OBFCEJO: Whitebox DES 329
5.4 Provably Secure Obfuscation: It s Impossible (Sometimes)! 335
5.4.1 A General Obfuscator 336
5.4.2 Obfuscating Learnable Functions 340
5.4.3 Proving that Obfuscation Is Impossible 341
5.4.4 Discussion 343
5.5 Provably Secure Obfuscation: Can It Be Saved? 344
5.5.1 Overcoming Impossibility 346
5.5.2 Definitions Revisited: Make Obfuscation Interactive 346
5.5.3 Definition Revisited: Make Obfuscation
Non-Semantics Preserving 349
5.6 Discussion 354
6 Dynamic Obfuscation 357
6.1 Definitions 360
6.2 Moving Code Around 362
6.2.1 Algorithm OBFKMNM: Replacing Instructions 362
6.2.2 OBFAGswap: Self-Modifying State Machine 366
6.2.3 OBFMAMDSB: Dynamic Code Merging 376
6.3 Encryption 383
6.3.1 OBFCKSP: Code as Key Material 385
6.3.2 OBFAGcypt: Combining Self-Modification and Encryption 392
6.4 Discussion 398
7 Software Tamperproofing 401
7.1 Definitions 405
7.1.1 Checking for Tampering 406
Contents xi
7.1.2 Responding to Tampering 410
7.1.3 System Design 410
7.2 Introspection 412
7.2.1 Algorithm tpCA: Checker Network 414
7.2.2 Generating Hash Functions 418
7.2.3 Algorithm TPHMST: Hiding Hash Values 423
7.2.4 The Skype Obfuscated Protocol 431
7.2.5 Algorithm REWOS: Attacking Self-Hashing Algorithms 435
7.2.6 Discussion 439
7.3 Algorithm TPTCJ: Response Mechanisms 440
7.4 State Inspection 444
7.4.1 Algorithm TPCVCPSJ: Oblivious Hash Functions 447
7.4.2 Algorithm TPjJV: Overlapping Instructions 450
7.5 Remote Tamperproofing 453
7.5.1 Distributed Check and Respond 454
7.5.2 Solution Strategies 454
7.5.3 Algorithm TPZG: Slicing Functions 455
7.5.4 Algorithm TPSLSPDK: Measuring Remote Hardware 459
7.5.5 TPCNS: Continuous Replacement 462
7.6 Discussion 464
8 Software Watermarking 467
8.1 History and Applications 468
8.1.1 Applications 468
8.1.2 Embedding a Mark in Audio 472
8.1.3 Embedding a Mark in an Image 474
8.1.4 Embedding a Mark in Natural-Language Text 475
8.2 Watermarking Software 478
8.3 Definitions 480
8.3.1 Watermark Credibility 482
8.3.2 Attacks 484
8.3.3 Watermarking vs. Fingerprinting 485
8.4 Watermarking by Permutation 486
8.4.1 Algorithm WMDM: Reordering Basic Blocks 488
8.4.2 Renumbering 490
8.4.3 Algorithm WMQP: Improving Credibility 491
8.5 Tamperproofing Watermarks 494
8.5.1 Algorithm WMMC: Embedding Media Watermarks 495
8.6 Improving Resilience 498
8.6.1 Algorithm WMSHKQ: Statistical Watermarking 498
8.7 Improving Stealth 505
Xll
Contents
8.7.1 Algorithm WMMIMIT: Mapping Instructions 505
8.7.2 Algorithm WMWS: Watermarks in CFGs 506
8.7.3 Algorithm WMCC: Abstract Interpretation 516
8.8 Steganographic Embeddings 522
8.8.1 Algorithm WMASB: The Compiler as Embedder 523
8.9 Splitting Watermark Integers 526
8.9.1 Splitting a Large Mark into Small Pieces 527
8.9.2 Redundant Watermark Pieces 528
8.9.3 Sparse Codes for Increased Credibility 531
8.10 Graph Codecs 533
8.10.1 Oriented Parent-Pointer Tree 534
8.10.2 Radix Graphs 534
8.10.3 Permutation Graphs 535
8.10.4 Planted Plane Cubic Trees 536
8.10.5 Reducible Permutation Graphs 536
8.11 Discussion 537
8.11.1 Embedding Techniques 539
8.11.2 Attack Models 539
9 Dynamic Watermarking 541
9.1 Algorithm WMCT: Exploiting Aliasing 546
9.1.1 A Simple Example 547
9.1.2 Recognition Problems 549
9.1.3 Increasing Bitrate 551
9.1.4 Increasing Resilience to Attack 557
9.1.5 Increasing Stealth 561
9.1.6 Discussion 564
9.2 Algorithm WMNT: Exploiting Parallelism 565
9.2.1 Embedding Watermarking Widgets 569
9.2.2 Embedding Example 574
9.2.3 Recognition 577
9.2.4 Avoiding Pattern-Matching Attacks 579
9.2.5 Tamperproofing Widgets 580
9.2.6 Discussion 581
9.3 Algorithm WMCCDKHLSpaths-- Expanding Execution Paths 583
9.3.1 Encoding and Embedding 584
9.3.2 Recognition 590
9.3.3 Discussion 591
9.4 Algorithm WMCCDKHLSi,/: Tamperproofing Execution Paths 592
9.4.1 Embedding 593
9.4.2 Recognition 595
Contents xiii
9.4.3 Tamperproofing the Branches 596
9.4.4 Discussion 597
9.5 Discussion 598
10 Software Similarity Analysis 601
10.1 Applications 602
10.1.1 Clone Detection 603
10.1.2 Software Forensics 605
10.1.3 Plagiarism Detection 608
10.1.4 Birthmark Detection 610
10.2 Definitions 611
10.2.1 Similarity Measures 612
10.3 ^-gram-Based Analysis 616
10.3.1 SSSWAwinnow- Selecting £-gram Hashes 616
10.3.2 SSSWAmoss- Software Plagiarism Detection 619
10.3.3 SSMCkgram- £-gram Java Bytecode Birthmarks 623
10.4 API-Based Analysis 625
10.4.1 SSTNMM: Object-Oriented Birthmarks 626
10.4.2 SSTONMM: Dynamic Function Call Birthmarks 629
10.4.3 SSSDL: Dynamic £-gram API Birthmarks 630
10.5 Tree-Based Analysis 631
10.5.1 SSEFM: AST-Based Clone Detection 631
10.6 Graph-Based Analysis 635
10.6.1 SSKH: PDG-Based Clone Detection 636
10.6.2 SSLCHY: PDG-Based Plagiarism Detection 640
10.6.3 SSMCwpp: Dynamic Whole Program Birthmarks 641
10.7 Metrics-Based Analysis 644
10.7.1 SSKK: Metrics-Based Clone Detection 645
10.7.2 SSLM: Metrics-Based Authorship Analysis 646
10.8 Discussion 652
11 Hardware for Protecting Software 655
11.1 Anti-Piracy by Physical Distribution 657
11.1.1 Distribution Disk Protection 658
11.1.2 Dongles and Tokens 664
11.2 Authenticated Boot Using a Trusted Platform Module 670
11.2.1 Trusted Boot 671
11.2.2 Taking Measurements 673
11.2.3 TheTPM 676
11.2.4 The Challenge 677
xiv Contents
11.2.5 Social Trust and Privacy Issues 679
11.2.6 Applications and Controversies 681
11.3 Encrypted Execution 683
11.3.1 The XOM Architecture 685
11.3.2 Preventing Replay Attacks 688
11.3.3 Fixing a Leaky Address Bus 690
11.3.4 Fixing a Leaky Data Bus 694
11.3.5 Discussion 694
11.4 Attacks on Tamperproof Devices 695
11.4.1 Tapping the Bus?The Microsoft XBOX Hack 696
11.4.2 Injecting Ciphertext?Dallas Semiconductor DS5002FP 697
11.4.3 Hacking Smartcards 701
11.4.4 Non-Invasive Attacks 705
11.4.5 Board-Level Protection 708
11.5 Discussion 711
Bibliography 713
Index 737
|
any_adam_object | 1 |
author | Collberg, Christian Nagra, Jasvir |
author_facet | Collberg, Christian Nagra, Jasvir |
author_role | aut aut |
author_sort | Collberg, Christian |
author_variant | c c cc j n jn |
building | Verbundindex |
bvnumber | BV039161510 |
ctrlnum | (OCoLC)729926272 (DE-599)HBZHT016102697 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01665nam a2200421 c 4500</leader><controlfield tag="001">BV039161510</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110727s2010 d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA941851</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">015169897</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321549252</subfield><subfield code="c">(pbk) : £35.99</subfield><subfield code="9">0-321-54925-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321549259</subfield><subfield code="9">978-0-321-54925-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)729926272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT016102697</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collberg, Christian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surreptitious software</subfield><subfield code="b">obfuscation, watermarking, and tamperproofing for software protection</subfield><subfield code="c">Christian Collberg ; Jasvir Nagra</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 748 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Addison-Wesley Software security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nagra, Jasvir</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024178996&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024178996</subfield></datafield></record></collection> |
id | DE-604.BV039161510 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:00:20Z |
institution | BVB |
isbn | 0321549252 9780321549259 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024178996 |
oclc_num | 729926272 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | XXVII, 748 S. graph. Darst. 24cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Addison-Wesley |
record_format | marc |
series2 | Addison-Wesley Software security series |
spelling | Collberg, Christian Verfasser aut Surreptitious software obfuscation, watermarking, and tamperproofing for software protection Christian Collberg ; Jasvir Nagra 1. print. Upper Saddle River, NJ [u.a.] Addison-Wesley 2010 XXVII, 748 S. graph. Darst. 24cm txt rdacontent n rdamedia nc rdacarrier Addison-Wesley Software security series Includes bibliographical references and index Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Nagra, Jasvir Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024178996&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Collberg, Christian Nagra, Jasvir Surreptitious software obfuscation, watermarking, and tamperproofing for software protection Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4274324-2 |
title | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection |
title_auth | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection |
title_exact_search | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection |
title_full | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection Christian Collberg ; Jasvir Nagra |
title_fullStr | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection Christian Collberg ; Jasvir Nagra |
title_full_unstemmed | Surreptitious software obfuscation, watermarking, and tamperproofing for software protection Christian Collberg ; Jasvir Nagra |
title_short | Surreptitious software |
title_sort | surreptitious software obfuscation watermarking and tamperproofing for software protection |
title_sub | obfuscation, watermarking, and tamperproofing for software protection |
topic | Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kryptologie Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024178996&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT collbergchristian surreptitioussoftwareobfuscationwatermarkingandtamperproofingforsoftwareprotection AT nagrajasvir surreptitioussoftwareobfuscationwatermarkingandtamperproofingforsoftwareprotection |