TY - GEN
T1 - Surreptitious software
T2 - 4th International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007
AU - Collberg, Christian
AU - Nagra, Jasvir
AU - Wang, Fei Yue
PY - 2007
Y1 - 2007
N2 - Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamperproofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.
AB - Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamperproofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.
KW - Software protection
KW - defense mechanisms
KW - taxonomy
UR - http://www.scopus.com/inward/record.url?scp=84885002947&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885002947&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-73986-9_1
DO - 10.1007/978-3-540-73986-9_1
M3 - Conference contribution
AN - SCOPUS:84885002947
SN - 9783540739852
T3 - Communications in Computer and Information Science
SP - 1
EP - 21
BT - Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings
Y2 - 13 September 2007 through 15 September 2007
ER -