2002
DOI: 10.1007/3-540-47870-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Self-Checking Techniques for Improved Tamper Resistance

Abstract: Abstract. We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes several innovations to make it stealthy and more robust.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
100
0
1

Year Published

2003
2003
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 104 publications
(101 citation statements)
references
References 13 publications
0
100
0
1
Order By: Relevance
“…Our guards, which modify code depending on other code, offer several advantages over the software guards proposed by Chang and Attalah [4] and the those from Horne et al [9]:…”
Section: White-box Attacksmentioning
confidence: 95%
See 3 more Smart Citations
“…Our guards, which modify code depending on other code, offer several advantages over the software guards proposed by Chang and Attalah [4] and the those from Horne et al [9]:…”
Section: White-box Attacksmentioning
confidence: 95%
“…If one would change a program at random places one could no longer guarantee the correct working of the application after modification. Several papers present the idea of self-verifying code [4,9] that is able to detect any changes to critical code. These schemes, however, do not protect against analysis of code.…”
Section: Software Security and Threatsmentioning
confidence: 99%
See 2 more Smart Citations
“…Numerous protection schemes have been proposed to address this issue including watermarking, tamper-resistance, and obfuscation [16]. Tamper resistance allows a program to validate its own integrity and to cease operation if it has been modified [17]- [19]. Watermarking incorporates a developer signature into a program to detect intellectual property theft and reuse [20], [21].…”
Section: Related Workmentioning
confidence: 99%