Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Published: |
Upper Saddle River, NJ:
Addison-Wesley,
2010.
|
| Series: | Addison-Wesley software security series
|
| Subjects: |
Table of Contents:
- What is surreptitious software?
- Methods of attack and defense
- Program analysis
- Code obfuscation
- Obfuscation theory
- Dynamic obfuscation
- Software tamperproofing
- Software watermarking
- Dynamic watermarking
- Software similarity an