Fwd: Anyone make any sense out of this skype hack announcement?

2010-07-12 Thread Christian Collberg
The skype client was reverse engineered several years ago:

@inproceedings{biondi06silver,
  title = {Silver Needle in the Skype},
  author = {Philippe Biondi and Fabrice Desclaux},
  note = 
\url{www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up.pdf},
  booktitle = {Black Hat Europe},
  month = Feb-Mar,
  year = 2006
}

I don't know if the new crack reveals anything new. We have
a writeup about the Skype protection techniques in
Surreptitious Software, our book on security-through-obscurity.
(Sorry for the blatant self-promotion).

Christian Collberg
Univ. Arizona

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


ANNOUNCE: New book on software protection

2009-08-05 Thread Christian Collberg
Dear all,

Our new book Surreptitious Software: Obfuscation, Watermarking,
and Tamperproofing for Software Protection was just released.
It is published in Addison-Wesley's Software Security Series
edited by Gary McGraw:
   http://buildingsecurityin.com

The book covers, among other things, these topics:
    * Understanding the theoretical limits of code obfuscation
    * Detecting software tampering in distributed system
    * Mastering techniques that both attackers and defenders use to
  analyze programs
    * Using code obfuscation to make software harder to analyze and
  understand
    * Fingerprinting software to identify its author and to trace
  software pirates
    * Tamperproofing software using guards that detect and respond to
  illegal modifications of code and data
    * Strengthening content protection through dynamic watermarking
  and dynamic obfuscation
    * Detecting code theft via software similarity analysis and
  birthmarking algorithms
    * Using hardware techniques to defend software and media against
  piracy and tampering

For more about the book, including the table of contents, see
   
http://www.pearsonhighered.com/educator/product/Surreptitious-Software-Obfuscation-Watermarking-and-Tamperproofing-for-Software-Protection/9780321549259.page
Also, see Gary's introduction:
   
http://www.cigital.com/justiceleague/2009/07/29/is-software-protection-software-security/

Christian Collberg and Jasvir Nagra

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com