Surreptitious software: Models from Biology and History

Christian Collberg, Jasvir Nagra, Fei Yue Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamperproofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.

Original languageEnglish (US)
Title of host publicationComputer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings
Pages1-21
Number of pages21
DOIs
StatePublished - Dec 1 2007
Event4th International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007 - St. Petersburg, Russian Federation
Duration: Sep 13 2007Sep 15 2007

Publication series

NameCommunications in Computer and Information Science
Volume1
ISSN (Print)1865-0929

Other

Other4th International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007
CountryRussian Federation
CitySt. Petersburg
Period9/13/079/15/07

    Fingerprint

Keywords

  • Software protection
  • defense mechanisms
  • taxonomy

ASJC Scopus subject areas

  • Computer Science(all)
  • Mathematics(all)

Cite this

Collberg, C., Nagra, J., & Wang, F. Y. (2007). Surreptitious software: Models from Biology and History. In Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings (pp. 1-21). (Communications in Computer and Information Science; Vol. 1). https://doi.org/10.1007/978-3-540-73986-9_1