O'Reilly logo

Surreptitious Software by Christian Collberg, Jasvir Nagra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Hardware for Protecting Software

The focus of this book is on software-based techniques for software protection. The advantage of software-only approaches is exactly that—they require no special hardware to run. This means that your protected program should run everywhere, regardless of the capabilities your customer’s hardware happens to have. The disadvantage is that the code is always available to the attacker to examine and modify. You can make it more difficult for him to do so, using the obfuscation and tamperproofing techniques from previous chapters, but the code is there ready to be attacked, and with the current state of the art, given an adversary with enough tenacity, defenses will eventually be breached.

There have been ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required