Surreptitious Software et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 57,91
  • Tous les prix incluent la TVA.
Il ne reste plus que 6 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Surreptitious Software: O... a été ajouté à votre Panier
Amazon rachète votre
article EUR 11,36 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperpr (Anglais) Broché – 24 juillet 2009


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 57,91
EUR 47,39 EUR 89,94

Offres spéciales et liens associés



Descriptions du produit

Quatrième de couverture

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
    —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University

Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance  penalty they incur.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

Coverage includes
  • Mastering techniques that both attackers and defenders use to analyze programs
  • Using code obfuscation to make software harder to analyze and understand
  • Fingerprinting software to identify its author and to trace software pirates
  • Tamperproofing software using guards that detect and respond to illegal modifications of code and data
  • Strengthening content protection through dynamic watermarking and dynamic obfuscation
  • Detecting code theft via software similarity analysis and birthmarking algorithms
  • Using hardware techniques to defend software and media against piracy and tampering
  • Detecting software tampering in distributed system
  • Understanding the theoretical limits of code obfuscation

Biographie de l'auteur

Christian Collberg received a B.Sc. in computer science and numerical analysis and a Ph.D. in computer science from Lund University, Sweden. He is currently an associate professor in the department of computer science at the University of Arizona and has also worked at the University of Auckland, New Zealand, and the Chinese Academy of Sciences in Beijing. Professor Collberg is a leading researcher in the intellectual property protection of software, and also maintains an interest in compiler and programming language research. In his spare time he writes songs, sings, and plays guitar for The Zax and hopes one day to finish his Great Swedish Novel.

Jasvir Nagra received his B.Sc. in mathematics and computer science and a Ph.D. in computer science from the University of Auckland, New Zealand. He’s been a postdoctoral scholar on the RE-TRUST project at the University of Trento, where his focus is on applying obfuscation, tamperproofing, and watermarking techniques to protect the integrity of software executing on a remote untrusted platform. His research interests also include the design of programming languages and its impact on the security of applications. He’s currently with Google Inc., where he is building Caja, an open source, secure subset of JavaScript. In his spare time Jasvir dabbles with Lego and one day hopes to finish building his Turing machine made entirely out of Lego blocks.



Vendez cet article - Prix de rachat jusqu'à EUR 11,36
Vendez Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperpr contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 11,36, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

  • Broché: 792 pages
  • Editeur : Addison Wesley; Édition : 1 (24 juillet 2009)
  • Langue : Anglais
  • ISBN-10: 0321549252
  • ISBN-13: 978-0321549259
  • Dimensions du produit: 17,8 x 4,1 x 22,6 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: 92.735 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  • Table des matières complète
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
1
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
Voir le commentaire client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

1 internautes sur 1 ont trouvé ce commentaire utile  Par Sebastien B. sur 14 mars 2010
Format: Broché
As an IT security student, this book is likely the best to get started, understand how these mechanisms work and how they are implemented. A must have!
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4 commentaires
14 internautes sur 16 ont trouvé ce commentaire utile 
A very interesting read on securing your software 27 septembre 2009
Par calvinnme - Publié sur Amazon.com
Format: Broché
This book was very interesting to me. I really don't work in such a way that I would have a need to deploy my own software for money and therefore need to worry about hiding the details of my code, but it was an aspect of computer security I didn't know much about until I sat down with this book. The book is not about trying to keep people out of your computer networks, but it is about keeping unauthorized users from executing your code and about disabling the analysis of your code by those who might want to extract details about some algorithm for the purpose of copying it.

I thought that the algorithms involved were very well explained and code snippets were shown to illustrate key concepts. The author employs widely used languages such as PERL for his examples. Commercial products are mentioned when applicable. I really enjoyed the sections on steganography and watermarking - these sections contain the clearest descriptions of the key algorithms involved that I've seen. I had only seen this subject mentioned before in the context of information hiding inside of an image, and the author did a great job of applying it to the conditional hiding of software details.

I'd highly recommend this especially to anyone involved in securing software, but even if you are not it is a good exercise in "stretching your brain" on a timely computer science topic. The reader should already be an able programmer in a number of the more common languages (PERL, Java, C) and you should probably have a background in computer science equivalent to a four year degree in order to get the most from this book. The table of contents are not currently shown in the product information, so I include that next.

Chapter 1. What Is Surreptitious Software?
Section 1.1. Setting the Scene
Section 1.2. Attack and Defense
Section 1.3. Program Analysis
Section 1.4. Code Obfuscation
Section 1.5. Tamperproofing
Section 1.6. Software Watermarking
Section 1.7. Software Similarity
Section 1.8. Hardware-Based Protection Techniques
Section 1.9. Discussion
Section 1.10. Notation
Chapter 2. Methods of Attack and Defense
Section 2.1. Attack Strategies
Section 2.2. Defense Strategies
Section 2.3. Discussion
Chapter 3. Program Analysis
Section 3.1. Static Analysis
Section 3.2. Dynamic Analysis
Section 3.3. Reconstituting Source
Section 3.4. Pragmatic Analysis
Section 3.5. Discussion
Chapter 4. Code Obfuscation
Section 4.1. Semantics-Preserving Obfuscating Transformations
Section 4.2. Definitions
Section 4.3. Complicating Control Flow
Section 4.4. Opaque Predicates
Section 4.5. Data Encodings
Section 4.6. Breaking Abstractions
Section 4.7. Discussion
Chapter 5. Obfuscation Theory
Section 5.1. Definitions
Section 5.2. Provably Secure Obfuscation: Possible or Impossible?
Section 5.3. Provably Secure Obfuscation: It's Possible (Sometimes)!
Section 5.4. Provably Secure Obfuscation: It's Impossible (Sometimes)!
Section 5.5. Provably Secure Obfuscation: Can It Be Saved?
Section 5.6. Discussion
Chapter 6. Dynamic Obfuscation
Section 6.1. Definitions
Section 6.2. Moving Code Around
Section 6.3. Encryption
Section 6.4. Discussion
Chapter 7. Software Tamperproofing
Section 7.1. Definitions
Section 7.2. Introspection
Section 7.4. State Inspection
Section 7.5. Remote Tamperproofing
Section 7.6. Discussion
Chapter 8. Software Watermarking
Section 8.1. History and Applications
Section 8.2. Watermarking Software
Section 8.3. Definitions
Section 8.4. Watermarking by Permutation
Section 8.5. Tamperproofing Watermarks
Section 8.6. Improving Resilience
Section 8.7. Improving Stealth
Section 8.8. Steganographic Embeddings
Section 8.9. Splitting Watermark Integers
Section 8.10. Graph Codecs
Section 8.11. Discussion
Chapter 9. Dynamic Watermarking
Section 9.1. Algorithm WMCT: Exploiting Aliasing
Section 9.2. Algorithm WMNT: Exploiting Parallelism
Section 9.3. Algorithm WMCCDKHLSpaths: Expanding Execution Paths
Section 9.4. Algorithm WMCCDKHLSbf: Tamperproofing Execution Paths
Section 9.5. Discussion
Chapter 10. Software Similarity Analysis
Section 10.1. Applications
Section 10.2. Definitions
Section 10.3. k-gram-Based Analysis
Section 10.4. API-Based Analysis
Section 10.5. Tree-Based Analysis
Section 10.6. Graph-Based Analysis
Section 10.7. Metrics-Based Analysis
Section 10.8. Discussion
Chapter 11. Hardware for Protecting Software
Section 11.1. Anti-Piracy by Physical Distribution
Section 11.2. Authenticated Boot Using a Trusted Platform Module
Section 11.3. Encrypted Execution
Section 11.4. Attacks on Tamperproof Devices
Section 11.5. Discussion
Very good 23 avril 2014
Par Marius Glasberg - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Very good, maybe the best resource for protecting your own software releases.
A must read, with a good price!
Thank you!
1 internautes sur 4 ont trouvé ce commentaire utile 
Packs in tips on security and tools for fighting software piracy 16 novembre 2009
Par Midwest Book Review - Publié sur Amazon.com
Format: Broché
Christian Collberg's SURREPTITIOUS SOFTWARE packs in tips on security and tools for fighting software piracy and covers all the latest programs that both attackers and defenders use to analyze programs. From fingerprinting software to identify its author to tamper-proofing software with guards, strengthening content, and detecting code theft, this is a key acquisition for any serious software library, unparalleled in its content and coverage.
2 internautes sur 9 ont trouvé ce commentaire utile 
Securing software 29 juillet 2009
Par Gary McGraw - Publié sur Amazon.com
Format: Broché
This book is part of Addison-Wesley's software security series (which I edit). Most of the books in the series are about how to build more secure software. By contrast, this book is about how to protect software.

There are many resaons to protect software with watermarking, obfuscation, and tamperproofing. Perhaps your product needs protection from piracy (like a game, a book, or music). Perhaps your product involves top secret military ideas and may be captured by the enemy (like a predator drone shot down in Afghanistan). Whatever your reason for software protection might be, this book is the go to guide for protecting software.

Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

gem
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?