Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection

Show simple item record

dc.contributor.author Collberg, Christian en
dc.contributor.author Thomborson, C. en
dc.date.accessioned 2009-04-08T04:03:26Z en
dc.date.available 2009-04-08T04:03:26Z en
dc.date.issued 2000-02 en
dc.identifier.citation Computer Science Technical Reports 170 (2000) en
dc.identifier.issn 1173-3500 en
dc.identifier.uri http://hdl.handle.net/2292/3504 en
dc.description.abstract We identify three types of attack on the intellectual property contained in software, and three corresponding technical defences. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example to remove a watermark) will result in non-functional code. We briefly survey the available technology for each type of defense. en
dc.publisher Department of Computer Science, The University of Auckland, New Zealand en
dc.relation.ispartofseries Computer Science Technical Reports en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.source.uri http://www.cs.auckland.ac.nz/staff-cgi-bin/mjd/csTRcgi.pl?serial en
dc.title Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection en
dc.type Technical Report en
dc.subject.marsden Fields of Research::280000 Information, Computing and Communication Sciences en
dc.rights.holder The author(s) en


Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics