Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
 
Agrandissez cette image
 

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection [Format Kindle]

Jasvir Nagra , Christian Collberg
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 29,86 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 54,04
Prix Kindle : EUR 20,90 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 33,14 (61%)

  • Longueur : 792 pages
  • Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger
  • Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.
App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 20,90  
Broché EUR 55,33  

Black Friday : 7 jours d'Offres Éclair: profitez vite de nos petits prix pour faire vos cadeaux de Noël





Descriptions du produit

Présentation de l'éditeur

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
    —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University

Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance  penalty they incur.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

Coverage includes
  • Mastering techniques that both attackers and defenders use to analyze programs
  • Using code obfuscation to make software harder to analyze and understand
  • Fingerprinting software to identify its author and to trace software pirates
  • Tamperproofing software using guards that detect and respond to illegal modifications of code and data
  • Strengthening content protection through dynamic watermarking and dynamic obfuscation
  • Detecting code theft via software similarity analysis and birthmarking algorithms
  • Using hardware techniques to defend software and media against piracy and tampering
  • Detecting software tampering in distributed system
  • Understanding the theoretical limits of code obfuscation

Quatrième de couverture

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
    —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University

Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance  penalty they incur.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

Coverage includes
  • Mastering techniques that both attackers and defenders use to analyze programs
  • Using code obfuscation to make software harder to analyze and understand
  • Fingerprinting software to identify its author and to trace software pirates
  • Tamperproofing software using guards that detect and respond to illegal modifications of code and data
  • Strengthening content protection through dynamic watermarking and dynamic obfuscation
  • Detecting code theft via software similarity analysis and birthmarking algorithms
  • Using hardware techniques to defend software and media against piracy and tampering
  • Detecting software tampering in distributed system
  • Understanding the theoretical limits of code obfuscation

Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 great book! 14 mars 2010
Format:Broché
As an IT security student, this book is likely the best to get started, understand how these mechanisms work and how they are implemented. A must have!
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 5.0 étoiles sur 5  4 commentaires
14 internautes sur 16 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A very interesting read on securing your software 27 septembre 2009
Par calvinnme - Publié sur Amazon.com
Format:Broché
This book was very interesting to me. I really don't work in such a way that I would have a need to deploy my own software for money and therefore need to worry about hiding the details of my code, but it was an aspect of computer security I didn't know much about until I sat down with this book. The book is not about trying to keep people out of your computer networks, but it is about keeping unauthorized users from executing your code and about disabling the analysis of your code by those who might want to extract details about some algorithm for the purpose of copying it.

I thought that the algorithms involved were very well explained and code snippets were shown to illustrate key concepts. The author employs widely used languages such as PERL for his examples. Commercial products are mentioned when applicable. I really enjoyed the sections on steganography and watermarking - these sections contain the clearest descriptions of the key algorithms involved that I've seen. I had only seen this subject mentioned before in the context of information hiding inside of an image, and the author did a great job of applying it to the conditional hiding of software details.

I'd highly recommend this especially to anyone involved in securing software, but even if you are not it is a good exercise in "stretching your brain" on a timely computer science topic. The reader should already be an able programmer in a number of the more common languages (PERL, Java, C) and you should probably have a background in computer science equivalent to a four year degree in order to get the most from this book. The table of contents are not currently shown in the product information, so I include that next.

Chapter 1. What Is Surreptitious Software?
Section 1.1. Setting the Scene
Section 1.2. Attack and Defense
Section 1.3. Program Analysis
Section 1.4. Code Obfuscation
Section 1.5. Tamperproofing
Section 1.6. Software Watermarking
Section 1.7. Software Similarity
Section 1.8. Hardware-Based Protection Techniques
Section 1.9. Discussion
Section 1.10. Notation
Chapter 2. Methods of Attack and Defense
Section 2.1. Attack Strategies
Section 2.2. Defense Strategies
Section 2.3. Discussion
Chapter 3. Program Analysis
Section 3.1. Static Analysis
Section 3.2. Dynamic Analysis
Section 3.3. Reconstituting Source
Section 3.4. Pragmatic Analysis
Section 3.5. Discussion
Chapter 4. Code Obfuscation
Section 4.1. Semantics-Preserving Obfuscating Transformations
Section 4.2. Definitions
Section 4.3. Complicating Control Flow
Section 4.4. Opaque Predicates
Section 4.5. Data Encodings
Section 4.6. Breaking Abstractions
Section 4.7. Discussion
Chapter 5. Obfuscation Theory
Section 5.1. Definitions
Section 5.2. Provably Secure Obfuscation: Possible or Impossible?
Section 5.3. Provably Secure Obfuscation: It's Possible (Sometimes)!
Section 5.4. Provably Secure Obfuscation: It's Impossible (Sometimes)!
Section 5.5. Provably Secure Obfuscation: Can It Be Saved?
Section 5.6. Discussion
Chapter 6. Dynamic Obfuscation
Section 6.1. Definitions
Section 6.2. Moving Code Around
Section 6.3. Encryption
Section 6.4. Discussion
Chapter 7. Software Tamperproofing
Section 7.1. Definitions
Section 7.2. Introspection
Section 7.4. State Inspection
Section 7.5. Remote Tamperproofing
Section 7.6. Discussion
Chapter 8. Software Watermarking
Section 8.1. History and Applications
Section 8.2. Watermarking Software
Section 8.3. Definitions
Section 8.4. Watermarking by Permutation
Section 8.5. Tamperproofing Watermarks
Section 8.6. Improving Resilience
Section 8.7. Improving Stealth
Section 8.8. Steganographic Embeddings
Section 8.9. Splitting Watermark Integers
Section 8.10. Graph Codecs
Section 8.11. Discussion
Chapter 9. Dynamic Watermarking
Section 9.1. Algorithm WMCT: Exploiting Aliasing
Section 9.2. Algorithm WMNT: Exploiting Parallelism
Section 9.3. Algorithm WMCCDKHLSpaths: Expanding Execution Paths
Section 9.4. Algorithm WMCCDKHLSbf: Tamperproofing Execution Paths
Section 9.5. Discussion
Chapter 10. Software Similarity Analysis
Section 10.1. Applications
Section 10.2. Definitions
Section 10.3. k-gram-Based Analysis
Section 10.4. API-Based Analysis
Section 10.5. Tree-Based Analysis
Section 10.6. Graph-Based Analysis
Section 10.7. Metrics-Based Analysis
Section 10.8. Discussion
Chapter 11. Hardware for Protecting Software
Section 11.1. Anti-Piracy by Physical Distribution
Section 11.2. Authenticated Boot Using a Trusted Platform Module
Section 11.3. Encrypted Execution
Section 11.4. Attacks on Tamperproof Devices
Section 11.5. Discussion
5.0 étoiles sur 5 Very good 23 avril 2014
Par Marius Glasberg - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Very good, maybe the best resource for protecting your own software releases.
A must read, with a good price!
Thank you!
1 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Packs in tips on security and tools for fighting software piracy 16 novembre 2009
Par Midwest Book Review - Publié sur Amazon.com
Format:Broché
Christian Collberg's SURREPTITIOUS SOFTWARE packs in tips on security and tools for fighting software piracy and covers all the latest programs that both attackers and defenders use to analyze programs. From fingerprinting software to identify its author to tamper-proofing software with guards, strengthening content, and detecting code theft, this is a key acquisition for any serious software library, unparalleled in its content and coverage.
2 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Securing software 29 juillet 2009
Par Gary McGraw - Publié sur Amazon.com
Format:Broché
This book is part of Addison-Wesley's software security series (which I edit). Most of the books in the series are about how to build more secure software. By contrast, this book is about how to protect software.

There are many resaons to protect software with watermarking, obfuscation, and tamperproofing. Perhaps your product needs protection from piracy (like a game, a book, or music). Perhaps your product involves top secret military ideas and may be captured by the enemy (like a predator drone shot down in Afghanistan). Whatever your reason for software protection might be, this book is the go to guide for protecting software.

Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

gem
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique