Universität Wien
Warning! The directory is not yet complete and will be amended until the beginning of the term.

052121 VU Algorithms for Software Protection (2021S)

Continuous assessment of course work

Registration/Deregistration

Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).

Details

max. 25 participants
Language: English

Lecturers

Classes (iCal) - next class is marked with N

  • Tuesday 23.03. 09:00 - 12:00 Digital
  • Tuesday 20.04. 09:00 - 12:00 Digital
  • Tuesday 11.05. 09:00 - 12:00 Digital
  • Tuesday 01.06. 09:00 - 12:00 Digital
  • Tuesday 22.06. 09:00 - 12:00 Digital
  • Tuesday 29.06. 09:00 - 12:00 Digital

Information

Aims, contents and method of the course

Students learn which algorithms exist for protecting software against reverse engineering and how these algorithms can be integrated into a software development process. For this purpose, algorithms for code obfuscation (protection against program analysis), software watermarking and fingerprinting (protection against unauthorized distribution) and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of program analysis and know which techniques are used to perform reverse engineering attacks on programs. Students learn to evaluate the strength of a protection technique based on potency, resilience, stealth and cost.

Assessment and permitted materials

The grading will follow the following scheme:
- Group work with presentations (4 presentations of 15% each); 60% in total
- Written exam on the course content (40%)

The written exam scheduled for the end of the semester will be replaced by an online exam.

Minimum requirements and assessment criteria

Minimum requirements and assessment criteria:
89 <= P <= 100 Sehr Gut (1)
76 <= P < 89 Gut (2)
63 <= P < 76 Befriedigend (3)
50 <= P < 63 Genügend (4)
0 <= P < 50 Nicht Genügend (5)

Examination topics

Written exam:
All contents that are being presented in VO (lectures), including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.

Assignments:
4 hands-on assignments (groups of two or individual work)

Reading list

Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.

Association in the course directory

Module: AT-AL AT-ICS

Last modified: Fr 12.05.2023 00:13