Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /

Bibliographic Details
Main Author: Collberg, Christian
Other Authors: Nagra
Format: Book
Published: Upper Saddle River, NJ: Addison-Wesley, 2010.
Series:Addison-Wesley software security series
Subjects:
Table of Contents:
  • What is surreptitious software?
  • Methods of attack and defense
  • Program analysis
  • Code obfuscation
  • Obfuscation theory
  • Dynamic obfuscation
  • Software tamperproofing
  • Software watermarking
  • Dynamic watermarking
  • Software similarity an