Tamper Resistant Software by Integrity-Based Encryption

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 986
  • Download : 1233
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code means some level of assurance that the program will execute as expected even if it encounters the illegitimated modifications. We provide the method of protecting software from unauthorized modification. One important technique is an integrity-based encryption, by which a program, while running, checks itself to verify that it has not been modified and conceals some privacy sensitive parts of program.
Publisher
Springer Verlag (Germany)
Issue Date
2004
Description

International Conference on Parallel and Distributed Computing: Applications and Technologies (PDCAT'04)

Keywords

Security; Tamper Resistant Software; Software Protection

Citation

Lecture notes in computer science, v.3320, pp.608-612

ISBN
978-3-540-24013-6
ISSN
0302-9743
URI
http://hdl.handle.net/10203/379
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
82.pdf(122.78 kB)Download

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0