052121 VU Algorithms for Software Protection (2022S)
Continuous assessment of course work
Labels
Registration/Deregistration
Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).
- Registration is open from Mo 14.02.2022 09:00 to Th 24.02.2022 10:00
- Deregistration possible until Mo 14.03.2022 23:59
Details
max. 25 participants
Language: English
Lecturers
Classes (iCal) - next class is marked with N
- Thursday 17.03. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
- Thursday 07.04. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
- Thursday 28.04. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
- Thursday 19.05. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
- Thursday 09.06. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
- Thursday 23.06. 11:30 - 14:45 PC-Unterrichtsraum 3, Währinger Straße 29 1.OG
Information
Aims, contents and method of the course
Students learn which algorithms exist for protecting software against reverse engineering and how these algorithms can be integrated into a software development process. For this purpose, algorithms for code obfuscation (protection against program analysis), software watermarking and fingerprinting (protection against unauthorized distribution) and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of program analysis and know which techniques are used to perform reverse engineering attacks on programs. Students learn to evaluate the strength of a protection technique based on potency, resilience, stealth and cost.
Assessment and permitted materials
The grading will follow the following scheme:
- Group work with presentations (4 presentations of 15% each); 60% in total
- Written closed-book exam on the course content (40%)
- Group work with presentations (4 presentations of 15% each); 60% in total
- Written closed-book exam on the course content (40%)
Minimum requirements and assessment criteria
Minimum requirements and assessment criteria:
89 <= P <= 100 Sehr Gut (1)
76 <= P < 89 Gut (2)
63 <= P < 76 Befriedigend (3)
50 <= P < 63 Genügend (4)
0 <= P < 50 Nicht Genügend (5)
89 <= P <= 100 Sehr Gut (1)
76 <= P < 89 Gut (2)
63 <= P < 76 Befriedigend (3)
50 <= P < 63 Genügend (4)
0 <= P < 50 Nicht Genügend (5)
Examination topics
Written exam:
All contents that are being presented in VO (lectures), including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (groups of two or individual work)
All contents that are being presented in VO (lectures), including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (groups of two or individual work)
Reading list
Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.
Association in the course directory
Module: AT-AL AT-ICS
Last modified: Th 24.02.2022 14:47