dc.contributor.author |
Collberg, Christian |
en |
dc.contributor.author |
Thomborson, C. |
en |
dc.date.accessioned |
2009-04-08T04:03:26Z |
en |
dc.date.available |
2009-04-08T04:03:26Z |
en |
dc.date.issued |
2000-02 |
en |
dc.identifier.citation |
Computer Science Technical Reports 170 (2000) |
en |
dc.identifier.issn |
1173-3500 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/3504 |
en |
dc.description.abstract |
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defences. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example to remove a watermark) will result in non-functional code. We briefly survey the available technology for each type of defense. |
en |
dc.publisher |
Department of Computer Science, The University of Auckland, New Zealand |
en |
dc.relation.ispartofseries |
Computer Science Technical Reports |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.source.uri |
http://www.cs.auckland.ac.nz/staff-cgi-bin/mjd/csTRcgi.pl?serial |
en |
dc.title |
Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection |
en |
dc.type |
Technical Report |
en |
dc.subject.marsden |
Fields of Research::280000 Information, Computing and Communication Sciences |
en |
dc.rights.holder |
The author(s) |
en |