Dynamic Self-Checking Techniques for Improved Tamper Resistance
نویسندگان
چکیده
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes several innovations to make it stealthy and more robust.
منابع مشابه
Tamper Resistant Software Through Dynamic Integrity Checking
Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...
متن کاملImpact of Tamper Shape on the Efficiency and Vibrations Induced During Dynamic Compaction of Dry Sands by 3D Finite Element Modeling
Dynamic compaction is a soil improvement method which has been widely used for the increase of bearing capacity through stress wave propagation during heavy tamping. The cost and time of project implementation can be effectively curtailed by developing a model that can be used in the design of dynamic compaction operations. The numerical models offered so far are mostly one or two-dimensional, ...
متن کاملBlind Certification of Public Keys and Efficiently Revocable Cash: Secure Against Capable Attackers
Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical...
متن کاملSoftware Tamper Resistance Through Dynamic Program Monitoring
This paper describes a two instruction-stream (twoprocess) model for tamper resistance. One process (Monitor process, M-Process) is designed explicitly to monitor the control flow of the main program process (P-Process). The compilation phase compiles the software into two co-processes: P-process and M-process. The monitor process contains the control flow consistency conditions for the P-proce...
متن کاملTamper Detection for Safeguards and Treaty Monitoring: Fantasies, Realities, and Potentials Viewpoint
Tamper detection 2 has an important role to play in domestic nuclear security and safeguards, as well as in international verification and treaty monitoring. Unfortunately, ideas about tamper detection often seem to be based on misconceptions, fuzzy goals, and wishful thinking. Current tamper detection programs are hampered by these problems, as well as by poor training, limited analysis, vague...
متن کامل