Surreptitious software: Models from biology and history

Christian S Collberg, Jasvir Nagra, Fei Yue Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamper-proofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.

Original languageEnglish (US)
Title of host publicationCommunications in Computer and Information Science
Pages1-21
Number of pages21
Volume374
EditionPART II
DOIs
StatePublished - 2013
Event15th International Conference on Human-Computer Interaction, HCI International 2013 - Las Vegas, NV, United States
Duration: Jul 21 2013Jul 26 2013

Publication series

NameCommunications in Computer and Information Science
NumberPART II
Volume374
ISSN (Print)18650929

Other

Other15th International Conference on Human-Computer Interaction, HCI International 2013
CountryUnited States
CityLas Vegas, NV
Period7/21/137/26/13

Fingerprint

Reverse engineering
Watermarking
Taxonomies
Animals

Keywords

  • Defense mechanisms
  • Software protection
  • Taxonomy

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Collberg, C. S., Nagra, J., & Wang, F. Y. (2013). Surreptitious software: Models from biology and history. In Communications in Computer and Information Science (PART II ed., Vol. 374, pp. 1-21). (Communications in Computer and Information Science; Vol. 374, No. PART II). https://doi.org/10.1007/978-3-540-73986-9-1

Surreptitious software : Models from biology and history. / Collberg, Christian S; Nagra, Jasvir; Wang, Fei Yue.

Communications in Computer and Information Science. Vol. 374 PART II. ed. 2013. p. 1-21 (Communications in Computer and Information Science; Vol. 374, No. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collberg, CS, Nagra, J & Wang, FY 2013, Surreptitious software: Models from biology and history. in Communications in Computer and Information Science. PART II edn, vol. 374, Communications in Computer and Information Science, no. PART II, vol. 374, pp. 1-21, 15th International Conference on Human-Computer Interaction, HCI International 2013, Las Vegas, NV, United States, 7/21/13. https://doi.org/10.1007/978-3-540-73986-9-1
Collberg CS, Nagra J, Wang FY. Surreptitious software: Models from biology and history. In Communications in Computer and Information Science. PART II ed. Vol. 374. 2013. p. 1-21. (Communications in Computer and Information Science; PART II). https://doi.org/10.1007/978-3-540-73986-9-1
Collberg, Christian S ; Nagra, Jasvir ; Wang, Fei Yue. / Surreptitious software : Models from biology and history. Communications in Computer and Information Science. Vol. 374 PART II. ed. 2013. pp. 1-21 (Communications in Computer and Information Science; PART II).
@inproceedings{c55afb3b9638486ca0a18ebc5ebc05b5,
title = "Surreptitious software: Models from biology and history",
abstract = "Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamper-proofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.",
keywords = "Defense mechanisms, Software protection, Taxonomy",
author = "Collberg, {Christian S} and Jasvir Nagra and Wang, {Fei Yue}",
year = "2013",
doi = "10.1007/978-3-540-73986-9-1",
language = "English (US)",
isbn = "3540739858",
volume = "374",
series = "Communications in Computer and Information Science",
number = "PART II",
pages = "1--21",
booktitle = "Communications in Computer and Information Science",
edition = "PART II",

}

TY - GEN

T1 - Surreptitious software

T2 - Models from biology and history

AU - Collberg, Christian S

AU - Nagra, Jasvir

AU - Wang, Fei Yue

PY - 2013

Y1 - 2013

N2 - Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamper-proofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.

AB - Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamper-proofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.

KW - Defense mechanisms

KW - Software protection

KW - Taxonomy

UR - http://www.scopus.com/inward/record.url?scp=84887217980&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84887217980&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-73986-9-1

DO - 10.1007/978-3-540-73986-9-1

M3 - Conference contribution

AN - SCOPUS:84887217980

SN - 3540739858

SN - 9783540739852

VL - 374

T3 - Communications in Computer and Information Science

SP - 1

EP - 21

BT - Communications in Computer and Information Science

ER -