Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Watermarking, tamper-proffing, and obfuscation: tools for software protection
Collberg C., Thomborson C. IEEE Transactions on Software Engineering28 (8):735-746,2002.Type:Article
Date Reviewed: May 27 2003

Software piracy, reverse engineering, and tampering are the problems; watermarking, obfuscation, and tamper-proofing are the answers. Protecting software running in a malicious computer is the objective.

This is a survey, with 98 references. Some of them are merely mentioned, like the impossibility-of-obfuscation result in the 2001 Crypto conference, but their presence is a good sign. About a dozen techniques are described in a paragraph or two each, with varying degrees of clarity and completeness. The authors’ work on pointer aliasing obfuscation and dynamic graph watermarking is included. Droll stick figure illustrations enliven the definitions; data and flow diagrams are used to illustrate the techniques. The taxonomy is informal, and it is empirical rather than theoretical. The goals of the attacks are not precisely defined, and the countermeasures are not complete solutions.

There are some connections that could have been drawn that weren’t. For example, code obfuscation is listed as a countermeasure for reverse engineering, but it works for tamper-proofing as well. Still, given the modest length of the paper, it provides useful insights into the subject.

Reviewer:  Jon Millen Review #: CR127653 (0309-0899)
Bookmark and Share
  Featured Reviewer  
 
Authentication (D.4.6 ... )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Intellectual Property (K.4.4 ... )
 
 
Restructuring, Reverse Engineering, And Reengineering (D.2.7 ... )
 
 
Distribution, Maintenance, and Enhancement (D.2.7 )
 
 
Electronic Commerce (K.4.4 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy