O'Reilly logo

Surreptitious Software by Christian Collberg, Jasvir Nagra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Methods of Attack and Defense

There is a saying: “If you build a better mouse trap, someone will build a better mouse,” and that could well describe the eternal struggle between Doris and Axel in our surreptitious software scenarios from the last chapter. Axel comes up with a new way to analyze and modify Doris’ code, Doris retaliates with a cleverer watermarking algorithm and additional layers of obfuscation and tamperproofing, which prompts Axel to develop better analysis techniques, and so on. At present we see no end to this escalating war—as of yet there are no theoretical results or practical tools that could put an end to it once and for all, tipping the scales permanently in Doris’ or Axel’s favor, so this situation is simply ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required