Teaching security globally with christian collberg. Surreptitious software ebook by jasvir nagra, christian collberg author, isbn. Gary and christian discuss what drew christian to teaching computer security in the united states after living in several other countries, christian s book surreptitious software, christian s opinions on products that purport to offer software. Christian collberg and publisher addisonwesley professional ptg. Gary and christian discuss what drew christian to teaching computer security in the united states after living in several other countries, christian s book surreptitious software, christian s opinions on products. Obfuscation, watermarking, and tamperproofing for software. This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a must have. Its a new branch of software security, and it is one that christian collberg has termed surreptitious software in his newly published, coauthored book, which was released earlier this month. Christian collberg is the author of surreptitious software 4. Protection addisonwesley software security collberg, christian isbn. Surreptitious software is the first authoritative, comprehensive resource for. Teaching security globally with christian collberg synopsys. Click download or read online button to get surreptitious software book now. The first protection technique were going to look at is code obfuscation.
Aug 19, 2009 surreptitious software by christian collberg, 9780321549259, available at book depository with free delivery worldwide. Here are ways to communicate with me and the rest of the class. The difference between software security and cryptography is that in cryptography youre allowed to assume that there is one secret the key that your adversary will. Gary and christian discuss what drew christian to teaching computer security in the united states after living in several other countries, christians book surreptitious software, christians opinions on products. Product support announcement see the latest about covid19 shipping availability and videoweb edition load errors. Surreptitious software obfuscation, watermarking, and tamperproofing for software protection. Tamper proof software samir daoudis technical blog. Obfuscation, watermarking, and tamperproofing for software protection christian collberg jasvir nagra. Surreptitious software guide books acm digital library. Christian collberg and jasvir nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography.
Surreptitious software christian collberg 9780321549259 59. Surreptitious software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Obfuscation, watermarking, and tamperproofing for software protection ebook written by jasvir nagra, christian collberg. This site is like a library, use search box in the widget to get ebook that you want. Aug 17, 2009 its a new branch of software security, and it is one that christian collberg has termed surreptitious software in his newly published, coauthored book, which was released earlier this month. Christian collberg and jasvir nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Discover delightful childrens books with prime book box, a subscription that delivers new books every 1, 2, or 3 months new customers receive 15% off your first box. Surreptitious software ebook by jasvir nagra rakuten kobo.
Christian collberg and jasvir nagra discuss the basic techniques used to protect secrets stored in software, namely obfuscation, watermarking, tamperproofing, and birthmarking. Obfuscation, watermarking, and tamperproofing f by christian collberg and jasvir nagra overview this book gives thorough, scholarly coverage of an area of growing importance in computer security and is a must have for every researcher, student. Obfuscation, watermarking, and tamperproofing for software protection paperback by christian collberg on. Christian collberg and jasvir nagra bring together techniques drawn from related areas of computer science. Professor publishes book on software security uanews. Collberg, a university of arizona associate professor of computer science, authored the book with jasvir nagra, one of his former students, who is. Christian collberg received a way thats, most from code. Obfuscation, watermarking, and tamperproofing for software protection by christian collberg 20090803 paperback 1656. In this paper we present a model of surreptitious software techniques inspired by defense mechanisms found in other areas. Professor collberg is a leading researcher in the intellectual property protection of software, and also maintains an interest in compiler and programming language research. Surreptitious software exercise attacks breaking onsystem functions christian collberg department of computer science, university of arizona february 26, 2014 introduction player1is a digital rights management program. Obfuscation, watermarking, and tamperproofing for software protection. Surreptitious software ebook by jasvir nagra, christian.
Whats particularly interesting about obfuscation is that its a doubleedged sword. Models from biology and history over the last decade a bewildering array of techniques have been proposed to protect. Surreptitious software, christian collberg,9780321549259,addisonwesley,9780321549259 88. Christian collberg and jasvir nagra discuss the basic techniques used to protect secrets stored in software. He is currently an associate professor selection from surreptitious software book. Christian collberg and jasvir nagra bring together techniques drawn from related areas of computer science, including. Communications in computer and information science, 374part ii. Obfuscation, watermarking, and tamperproofing for software protection collberg, christian on. Bad guys use it to protect their malware from discovery you will see this in the next section, good guys use it to protect their programs from reverse engineering, and bad guys can also use it to destroy.
Christian collberg author of surreptitious software. Obfuscation, watermarking, and tamperproofing for software protection go to practical reverse engineering. Surreptitious software download ebook pdf, epub, tuebl, mobi. Read your book anywhere, on any device, through redshelfs cloud based. Jasvir nagra christian collberg this book gives thorough, scholarly coverage of an area of growing importance in computer security and is a must have for every researcher, student, and practicing professional in software. The following text is the standard reference for software protection christian collberg, jasvir nagra, surreptitious software obfuscation, watermarking, and tamperproofing for software protection, addisonwesley software security series, editor. Christian collberg and jasvir nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler. Surreptitious software exercise attacks searching the executable christian collberg department of computer science, university of arizona february 26, 2014 software protections in this version, player2fails if you have the wrong activation code.
Get it today with same day delivery, order pickup or drive up. Obfuscation, watermarking, and tamperproofing for software protection 1st edition by jasvir nagra. Download for offline reading, highlight, bookmark or take notes while you read surreptitious software. Obfuscation, watermarking, and tamperproofing for software protection, safari. On the 88th episode of the silver bullet security podcast, gary talks with christian collberg, ph. Authors christian collberg and jasvir nagra bring together techniques drawn from related areas of. Surreptitious software by jasvir nagra, christian collberg get surreptitious software now with oreilly online learning. Obfuscation, watermarking, and tamperproofing for software protection by christian collberg 20090803 christian collberg. Pdf surreptitious software obfuscation, watermarking. Pdf surreptitious software obfuscation, watermarking, and. Gary and christian discuss what drew christian to teaching computer security in the united states after living in several other countries, christians book surreptitious software, christians opinions on products that purport to offer software protection on mobile devices, and whether software security students should be taught to think like an attacker. Obfuscation, watermarking, and tamperproofing for software protection 9780321549259 by collberg, christian and a great selection of similar new, used and collectible books available now at. Breakthrough software protection techniques for fighting piracy, tampering, and malicious reverse engineering everything software and content developers need to know to protect their intellectual. This book gives thorough, scholarly coverage of an area of growin.
This acclaimed book by christian collberg is available at in several formats for your ereader. Obfuscation, watermarking, and tamperproofing for software protection ebook. Read surreptitious software obfuscation, watermarking, and tamperproofing for software protection by jasvir nagra available from rakuten kobo. Surreptitious software is the first authoritative, comprehensive resource for researchers. Surreptitious software addisonwesley software security.
1232 126 1272 1288 916 953 770 1290 1011 192 1136 1184 1627 439 308 1654 918 187 1602 142 539 1118 50 66 888 1204 942