Chapter 1. What Is Surreptitious Software?

In this first chapter we will talk about the basic techniques used to protect secrets stored in software, namely obfuscation, watermarking, tamperproofing, and birthmarking. These techniques have many interesting applications, such as the use of obfuscation and tamperproofing to protect media in digital rights management systems. What we think you will find particularly interesting is that obfuscation and the three other techniques “solve” problems that traditional computer security and cryptography can’t touch. We put “solve” in quotation marks because there are no known algorithms that provide complete security for an indefinite amount of time. At the present time, the best we can hope for is to be ...

Get Surreptitious Software now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.