1. What Is Surreptitious Software?
In this first chapter we will talk about the basic techniques used to protect secrets stored in software, namely obfuscation, watermarking, tamperproofing, and birthmarking. These techniques have many interesting applications, such as the use of obfuscation and tamperproofing to protect media in digital rights management systems. What we think you will find particularly interesting is that obfuscation and the three other techniques “solve” problems that traditional computer security and cryptography can’t touch. We put “solve” in quotation marks because there are no known algorithms that provide complete security for an indefinite amount of time. At the present time, the best we can hope for is to be able to ...
Get Surreptitious Software now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.