Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection 1st Edition

5 out of 5 stars 4 customer reviews
ISBN-13: 078-5342549256
ISBN-10: 0321549252
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Trade in your item
Get a $19.03
Gift Card.
Have one to sell? Sell on Amazon
Rent On clicking this link, a new layer will be open
$19.85 On clicking this link, a new layer will be open
Buy used On clicking this link, a new layer will be open
$42.56 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$45.48 On clicking this link, a new layer will be open
More Buying Choices
33 New from $40.53 28 Used from $38.05
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

click to open popover

Frequently Bought Together

  • Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection
  • +
  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
  • +
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Total price: $125.32
Buy the selected items together

Editorial Reviews

From the Back Cover

""This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing professional in software protection.""
-Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University
Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software" is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
Coverage includes
Mastering techniques that both attackers and defenders use to analyze programsUsing code obfuscation to make software harder to analyze and understandFingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and dataStrengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithmsUsing hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed systemUnderstanding the theoretical limits of code obfuscation

About the Author

Christian Collberg received a B.Sc. in computer science and numerical analysis and a Ph.D. in computer science from Lund University, Sweden. He is currently an associate professor in the department of computer science at the University of Arizona and has also worked at the University of Auckland, New Zealand, and the Chinese Academy of Sciences in Beijing. Professor Collberg is a leading researcher in the intellectual property protection of software, and also maintains an interest in compiler and programming language research. In his spare time he writes songs, sings, and plays guitar for The Zax and hopes one day to finish his Great Swedish Novel.

Jasvir Nagra received his B.Sc. in mathematics and computer science and a Ph.D. in computer science from the University of Auckland, New Zealand. He’s been a postdoctoral scholar on the RE-TRUST project at the University of Trento, where his focus is on applying obfuscation, tamperproofing, and watermarking techniques to protect the integrity of software executing on a remote untrusted platform. His research interests also include the design of programming languages and its impact on the security of applications. He’s currently with Google Inc., where he is building Caja, an open source, secure subset of JavaScript. In his spare time Jasvir dabbles with Lego and one day hopes to finish building his Turing machine made entirely out of Lego blocks.

NO_CONTENT_IN_FEATURE


Product Details

  • Paperback: 792 pages
  • Publisher: Addison-Wesley Professional; 1 edition (August 3, 2009)
  • Language: English
  • ISBN-10: 0321549252
  • ISBN-13: 978-0321549259
  • Product Dimensions: 7 x 1.7 x 9 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #601,153 in Books (See Top 100 in Books)

Customer Reviews

5 star
100%
4 star
0%
3 star
0%
2 star
0%
1 star
0%
See all 4 customer reviews
Share your thoughts with other customers

Top Customer Reviews

By calvinnme HALL OF FAMETOP 1000 REVIEWERVINE VOICE on September 27, 2009
Format: Paperback
This book was very interesting to me. I really don't work in such a way that I would have a need to deploy my own software for money and therefore need to worry about hiding the details of my code, but it was an aspect of computer security I didn't know much about until I sat down with this book. The book is not about trying to keep people out of your computer networks, but it is about keeping unauthorized users from executing your code and about disabling the analysis of your code by those who might want to extract details about some algorithm for the purpose of copying it.

I thought that the algorithms involved were very well explained and code snippets were shown to illustrate key concepts. The author employs widely used languages such as PERL for his examples. Commercial products are mentioned when applicable. I really enjoyed the sections on steganography and watermarking - these sections contain the clearest descriptions of the key algorithms involved that I've seen. I had only seen this subject mentioned before in the context of information hiding inside of an image, and the author did a great job of applying it to the conditional hiding of software details.

I'd highly recommend this especially to anyone involved in securing software, but even if you are not it is a good exercise in "stretching your brain" on a timely computer science topic. The reader should already be an able programmer in a number of the more common languages (PERL, Java, C) and you should probably have a background in computer science equivalent to a four year degree in order to get the most from this book. The table of contents are not currently shown in the product information, so I include that next.

Chapter 1. What Is Surreptitious Software?
Section 1.1.
Read more ›
Comment 14 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Very good, maybe the best resource for protecting your own software releases.
A must read, with a good price!
Thank you!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Christian Collberg's SURREPTITIOUS SOFTWARE packs in tips on security and tools for fighting software piracy and covers all the latest programs that both attackers and defenders use to analyze programs. From fingerprinting software to identify its author to tamper-proofing software with guards, strengthening content, and detecting code theft, this is a key acquisition for any serious software library, unparalleled in its content and coverage.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book is part of Addison-Wesley's software security series (which I edit). Most of the books in the series are about how to build more secure software. By contrast, this book is about how to protect software.

There are many resaons to protect software with watermarking, obfuscation, and tamperproofing. Perhaps your product needs protection from piracy (like a game, a book, or music). Perhaps your product involves top secret military ideas and may be captured by the enemy (like a predator drone shot down in Afghanistan). Whatever your reason for software protection might be, this book is the go to guide for protecting software.

Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

gem
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
This item: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection