2002
DOI: 10.1007/3-540-47870-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Software Code by Guards

Abstract: Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. Our approach … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
152
0
2

Year Published

2003
2003
2011
2011

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 124 publications
(154 citation statements)
references
References 7 publications
0
152
0
2
Order By: Relevance
“…Our guards, which modify code depending on other code, offer several advantages over the software guards proposed by Chang and Attalah [4] and the those from Horne et al [9]:…”
Section: White-box Attacksmentioning
confidence: 95%
See 4 more Smart Citations
“…Our guards, which modify code depending on other code, offer several advantages over the software guards proposed by Chang and Attalah [4] and the those from Horne et al [9]:…”
Section: White-box Attacksmentioning
confidence: 95%
“…If one would change a program at random places one could no longer guarantee the correct working of the application after modification. Several papers present the idea of self-verifying code [4,9] that is able to detect any changes to critical code. These schemes, however, do not protect against analysis of code.…”
Section: Software Security and Threatsmentioning
confidence: 99%
See 3 more Smart Citations