O'Reilly logo

Surreptitious Software by Christian Collberg, Jasvir Nagra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. What Is Surreptitious Software?

In this first chapter we will talk about the basic techniques used to protect secrets stored in software, namely obfuscation, watermarking, tamperproofing, and birthmarking. These techniques have many interesting applications, such as the use of obfuscation and tamperproofing to protect media in digital rights management systems. What we think you will find particularly interesting is that obfuscation and the three other techniques “solve” problems that traditional computer security and cryptography can’t touch. We put “solve” in quotation marks because there are no known algorithms that provide complete security for an indefinite amount of time. At the present time, the best we can hope for is to be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required