Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,951,056 papers from all fields of science
Search
Sign In
Create Free Account
Anti-tamper software
Known as:
Software anti-tamper
, Tamper-resistant software
Anti-tamper software (or tamper-resistant software) is software which makes it harder for an attacker to modify it. The measures involved can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Application security
Backdoor (computing)
Computer program
Copy protection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Hardware-Based Workload Forensics and Malware Detection in Microprocessors
Liwei Zhou
,
Y. Makris
International Workshop on Microprocessor Test and…
2016
Corpus ID: 3360278
We investigate the possibility of performing workload forensics and/or malware detection in microprocessors through exclusively…
Expand
2015
2015
Framework for software tampering detection in embedded systems
Abdo Ali Abdullah Al-Wosabi
,
Z. Shukur
,
Muhammad Azwan Ibrahim
International Conference on Electrical…
2015
Corpus ID: 16729234
Embedded systems (ES) become available anywhere and anytime as an established part of our daily routine. Developers of these…
Expand
2015
2015
Piracy prevention methods in software business
J. Korhonen
2015
Corpus ID: 168328213
There are various forms of piracy in software business, and many prevention techniques have been developed against them. Forms of…
Expand
2014
2014
Analyzing Security of Korean USIM-Based PKI Certificate Service
Shinjo Park
,
Suwan Park
,
Insu Yun
,
Dongkwan Kim
,
Yongdae Kim
Web Information System and Application Conference
2014
Corpus ID: 39031339
This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and…
Expand
2011
2011
Towards Checking Tampering of Software
N. Kumar
,
H. Shah
,
R. Shyamasundar
Cyber Security, Cyber Crime and Cyber Forensics
2011
Corpus ID: 14588935
Measuring integrity of software after deployment is important to ensure that software is not tampered with. Software tampering…
Expand
2009
2009
Tamper Resistance for Software Defined Radio Software
S. Xiao
,
J. Park
,
Y. Ye
33rd Annual IEEE International Computer Software…
2009
Corpus ID: 15822243
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When…
Expand
2008
2008
Timely Rootkit Detection During Live Response
Daniel Molina
,
Matthew Zimmerman
,
Gregory Roberts
,
Marnita Eaddie
,
Gilbert L. Peterson
IFIP Int. Conf. Digital Forensics
2008
Corpus ID: 10684874
This paper describes a non-intrusive rootkit detection tool designed to support forensic investigations that involve the live…
Expand
2006
2006
Some new approaches for preventing software tampering
Bin Fu
,
G. Richard
,
Yixin Chen
ACM-SE 44
2006
Corpus ID: 6238923
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis…
Expand
2003
2003
Proposal and Evaluation of Obfuscation Scheme for Java Source Codes by Partial Destruction of Encapsulation
Toshihiro Yamauchi
2003
Corpus ID: 64640738
Recently, Java has been spread widely. However, Java has a problem that an attacker can reconstruct Java source codes from Java…
Expand
2001
2001
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
Hideaki Goto
,
M. Mambo
,
Hiroki Shizuya
,
Y. Watanabe
Australasian Conference on Information Security…
2001
Corpus ID: 34470888
Recently the demand to make software resistant to manipulation is increasing. Similarly the demand to hide operation of software…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE