By Topic

Forensic analysis for tamper resistant software

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hongxia Jin ; Div. of Comput. Sci., IBM Almaden Res. Center, San Jose, CA, USA ; J. Lotspiech

This paper concerns the protection of a software program and/or the content that the program protects. Software piracy and digital media piracy have cost industries billions of dollars each year. The success of the content/software security technologies in a large part depends on the capability of protecting software code against tampering and detecting the attackers who distribute the pirate copies. In this paper, we focus on the attacker detection and forensic analysis. We shall talk about a proactive detection scheme for defeating an on-going attack before the compromise has occurred. We shall also briefly explain another detection scheme for post-compromise attacker identification. In particular, we consider real world scenarios where the application programs connect with their vendors periodically, and where a detection of attacking can bar a hacker user from further business.

Published in:

Software Reliability Engineering, 2003. ISSRE 2003. 14th International Symposium on

Date of Conference:

17-20 Nov. 2003