CSc 620 Surreptitious Software studies how to protect programs against intellectual property violations through obfuscation, watermarking, tamperproofing, birthmarking, and hardware protection.


The class page for 2008 is here. Lecture notes can be found here.