SearchSecurity.com

How to detect software tampering

The chapter below, from the book Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, reveals how to detect attacks on software: when a program is running on corrupted hardware and operating systems, when it is running under emulation and when the correct dynamic libraries have not been loaded, for example.

Authors Christian Collberg and Jasvir Nagra reveal how to check for software tampering by inspecting a program's code, computational results and execution environment.

See sidebar below to listen to an interview with the author.

Surreptitious Software
Chapter 7: Software Tamperproofing

Table of contents:

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement