O'Reilly logo

Surreptitious Software by Christian Collberg, Jasvir Nagra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Code Obfuscation

Code obfuscation is both the most important and the most elusive of the software protection techniques we discuss in this book. Elusive because it has proven hard to pin down exactly what obfuscation is, to devise practically useful algorithms, and to evaluate the quality of these algorithms, and important because if we could agree on definitions and devise strong algorithms, we would have a solution to many practical problems in security and cryptography.

Our discussion of code obfuscation will spread over three chapters. In this chapter, you will learn about some of the history of code obfuscation and the algorithms that have been proposed in the literature that are used in practice. In Chapter 5 (Obfuscation Theory), ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required