O'Reilly logo

Surreptitious Software by Christian Collberg, Jasvir Nagra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Software Similarity Analysis

So far, the algorithms you’ve seen, whether for obfuscation, tamperproofing, or watermarking, have had one thing in common: They’ve all been based on code transformations. That is, they take an unprotected program as input, apply one or more transformations on the code, and produce a more protected program as output. You can see this view of intellectual property protection reflected in the defense model in Section 2.2Software Similarity Analysis86: Each of the protection primitives takes an unprotected universe as input and produces as output one in which a precious object is better protected than before.

In this chapter, you’ll see ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required