Collberg, Christian.

Surreptitious software obfuscation, watermarking, and tamperproofing for software protection / [electronic resource] : Christian Collberg, Jasvir Nagra. - Upper Saddle River, N.J. : Addison-Wesley, 2009, c2010. - xxvii, 748 p. : ill. ; 23 cm. - Addison-Wesley software security series . - Addison-Wesley software security series. Safari Books Online. .

Includes bibliographical references and index.

What is surreptitious software? -- Methods of attack and defense -- Program analysis -- Code obfuscation -- Obfuscation theory -- Dynamic obfuscation -- Software tamperproofing -- Software watermarking -- Dynamic watermarking -- Software similarity analysis -- Hardware for protecting software.


Electronic reproduction.
Boston, Mass. :
Safari Books Online,
2009.
Mode of access: World Wide Web.
Available to subscribing institutions.

9780321591258 0321591259

CL0500000048 Safari Books Online


Computer security.
Cryptography.
Data protection.
Copyright and electronic data processing--United States.


Electronic books.