Reading List for 415.725SC “Software Security”

Clark Thomborson

19th October 2000

 

Please see http://www.cs.auckland.ac.nz/415.725SC/lectures/handout3.htm for detailed bibliographic information.

I.        Legal, Ethical, and Technical Frameworks for Security

A.    Technical & Conceptual

1.      19 July 2000: C Pfleeger (1997), Security in Computing, Chapter 1 “Is There a Security Problem in Computing?”

2.      10 August 2000: A Rubin (1998), “A Survey of Web Security”.

3.      2 August 2000: C Collberg (2000), “Watermarking, Tamper-Proofing, and Obfuscation – Tools for Software Protection”.

B.     Legal (Copyright, Patent, Contract)

1.      19 July 2000: University of Auckland, Computer Science Undergraduate Handbook (2000), Section 4.2 “Department of Computer Science Computer System Regulations”, Section 4.3 “University Computer System Regulations”.

2.      20 July 2000: K Nichols (1999), “The Age of Software Patents”, and letters to the editor of IEEE Computer (May 1999) in response to Nichols’ article.

3.      20 July 2000: P Samuelson (1998), “Encoding the Law into Digital Libraries”.

4.      31 July 2000: C Mann (2000), “Who Will Own Your Next Good Idea?”.

C.    Ethical

1.      27 July 2000: C Pfleeger (1997), Security in Computing, Section 11.5 “Ethical Issues in Computer Security”.

2.      31 July 2000: H Rosner (2000), “Steal This Software”.

3.      31 July 2000: P Radatti (1995), “CyberSoft, Incorporated Moral Guidelines”, incorporating C Tomlinson (1853) “Rudimentary Treatment on the Construction of Locks”.


II.       Cryptographic Techniques and e-Commerce

A.    Cryptography

1.      14 August 2000: D Stinson (1995), Cryptography: Theory and Practice, excerpts at pp. 1-7, 70-73, 114-116, 162-164, 127-128.

2.      14 August 2000: P Smith (1994), “Cryptography without Exponentiation”.

B.     E-Commerce

1.      7 August 2000: H Garcia-Molina (1998), “Safeguarding and Charging for Information on the Internet”.

2.      7 August 2000: M Bellare (2000), “Design, Implementation and Deployment of the iKP Secure Electronic Payment System”.

3.      11 September 2000: R Mori (1990), “Superdistribution: The Concept and the Architecture”.

4.      21 September 2000: R Hauser (1995), “Using the Internet to decrease Software Piracy - on Anonymous Receipts, Anonymous ID Cards, and Anonymous Vouchers”.

5.      28 September 2000: S Simmel (1994), “Metering and Licensing of Resources - Kala's General Purpose Approach”.

C.    Cryptographic Authentication and Dongles

1.      3 August 2000: D Margrave (1995), “GSM Security and Encryption”.

2.      13 September 2000: F Baker (2000), “RSVP Cryptographic Authentication”.

3.      16 August 2000: M Shore (2000), “H.323 and Firewalls: Problem Statement and Solution Framework”.

4.      23 August 2000: B Neuman (1994), “Kerberos: An Authentication Service for Computer Networks”.

5.      20 September 2000: L Gong (1998), “Signing, Sealing, and Guarding Java Objects”.

6.      28 September 2000: T Maude (1984), “Hardware Protection Against Software Piracy”.


III.    Non-Cryptographic Techniques

A.    Copy Prevention and Reverse Engineering

1.      9 August 2000: T Proebsting (1997), “Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?)”.

2.      4 October 2000: C Cifuentes (1999), “The Design of a Resourceable and Retargetable Binary Translator”.

3.      9 August 2000: M LaDue (1997), “The Maginot License: Failed Approaches to Licensing Java Software Over the Internet”.

4.      16 August 2000: C Collberg (1998), “Breaking Abstractions and Unstructuring Data Structures”.

5.      14 September 2000: D Aucsmith (1996), “Tamper Resistant Software: An Implementation”.

B.     Copy Detection and Steganography

1.      10 August 2000: N Shivakumar (1995), “SCAM: A Copy Detection Mechanism for Digital Documents”.

2.      23 August 2000: N Johnson (1998), “Exploring Steganography: Seeing the Unseen”.

3.      24 August 2000: L Matheson (1998), “Robustness and Security of Digital Watermarks”.

4.      21 September 2000: C Collberg (1999), “Software Watermarking: Models and Dynamic Embeddings”.

5.      11 September 2000: J Palsberg (2000), “Experience with Software Watermarking”.

6.      13 September 2000: B Baker (1998), “Deducing Similarities in Java Sources from Bytecodes”.

C.    Host Security

1.      3 August 2000: F Cohen (1992), “Operating System Protection Through Program Evolution”.

2.      17 August 2000: D Chess (1998), “Security Issues in Mobile Code Systems”.

3.      14 September 2000: D Dean (1996), “Java Security: From HotJava to Netscape and Beyond”.

4.      20 September 2000: D Wallach (1997), “Extensible Security Architectures for Java”.

5.      27 September 2000: J Ousterhout (1998), “The Safe-Tcl Security Model”.

6.      27 September 2000: K Thompson (1984), “Reflections on Trusting Trust”.