Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection (Paperback)
暫譯: 隱秘軟體:軟體保護的混淆、水印與防篡改技術
Christian Collberg, Jasvir Nagra
- 出版商: Addison Wesley
- 出版日期: 2009-07-01
- 售價: $2,580
- 貴賓價: 9.5 折 $2,451
- 語言: 英文
- 頁數: 792
- 裝訂: Paperback
- ISBN: 0321549252
- ISBN-13: 9780321549259
已絕版
買這商品的人也買了...
-
$2,560$2,432 -
$880$695 -
$780$741 -
$239$189 -
$990$891 -
$600$480 -
$790$774 -
$590$502 -
$380$323 -
$450$405 -
$5,178Advanced Signal Integrity for High-Speed Digital Designs (美國原版)
-
$750$638 -
$650$553 -
$500$395 -
$530$199 -
$400$316 -
$650$553 -
$520$411 -
$480$379 -
$580$458 -
$850$723 -
$580$458 -
$580$493 -
$680$530 -
$1,190$1,131
相關主題
商品描述
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
—Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University
Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
Coverage includes
—Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University
Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
Coverage includes
- Mastering techniques that both attackers and defenders use to analyze programs
- Using code obfuscation to make software harder to analyze and understand
- Fingerprinting software to identify its author and to trace software pirates
- Tamperproofing software using guards that detect and respond to illegal modifications of code and data
- Strengthening content protection through dynamic watermarking and dynamic obfuscation
- Detecting code theft via software similarity analysis and birthmarking algorithms
- Using hardware techniques to defend software and media against piracy and tampering
- Detecting software tampering in distributed system
- Understanding the theoretical limits of code obfuscation
商品描述(中文翻譯)
「本書對於計算機安全中日益重要的領域提供了全面且學術性的探討,是每位研究人員、學生及從事軟體保護的專業人士的必備書籍。」
—Mikhail Atallah,普渡大學計算機科學特聘教授
對抗軟體盜版、篡改及惡意逆向工程的理論、技術與工具
在過去十年中,抵抗軟體盜版和篡改的技術取得了顯著進展。這些技術對於尋求保護重要智慧財產的軟體開發者來說是不可或缺的。隱秘軟體是第一本權威且全面的資源,適合希望了解這些方法、它們所提供的安全級別以及所產生的性能損失的研究人員、開發者和學生。
Christian Collberg 和 Jasvir Nagra 整合了來自計算機科學相關領域的技術,包括密碼學、隱寫術、水印技術、軟體度量、逆向工程和編譯器優化。透過大量的範例程式碼,他們向讀者展示如何實施從程式碼混淆和軟體指紋識別到防篡改和出生標記的保護方案,並討論這些技術的理論和實際限制。
內容涵蓋
- 掌握攻擊者和防禦者用來分析程式的技術
- 使用程式碼混淆使軟體更難以分析和理解
- 對軟體進行指紋識別以識別其作者並追蹤軟體盜版者
- 使用檢測和響應非法修改程式碼和數據的防護措施來防篡改軟體
- 透過動態水印和動態混淆加強內容保護
- 透過軟體相似性分析和出生標記算法檢測程式碼盜竊
- 使用硬體技術來保護軟體和媒體免受盜版和篡改
- 在分散式系統中檢測軟體篡改
- 理解程式碼混淆的理論極限