36:
241:(DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them. Malicious software itself can and has been observed using anti-tampering techniques, for example the
222:, so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger. A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified. A simple (and easily defeated) scheme of this kind was used in the
194:. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as
185:
Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as
182:, code interference to extract data or algorithms and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance.
151:
and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no
571:
229:
Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems,
178:
injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of
226:
video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.
620:
143:
difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified. It is essentially
17:
425:
100:
72:
572:"Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics"
162:
Tampering can be malicious, to gain control over some aspect of the software with an unauthorized modification that alters the
641:
603:
554:
527:
341:
300:
53:
79:
685:
86:
379:
119:
619:
Sinha, P.; Boukhtouta, A.; Belarde, V. H.; Debbabi, M. (2010). "Insights from the analysis of the
Mariposa botnet".
319:
Jakubowski, M. H.; Saw, C. W. (N.); Venkatesan, R. (2009). "Tamper-Tolerant
Software: Modeling and Implementation".
68:
210:
has become a common anti-tamper method used in recent years for commercial software; it is used for example in
57:
147:
implemented in the software domain. It shares certain aspects but also differs from related technologies like
434:
135:
is software which makes it harder for an attacker to modify it. The measures involved can be passive such as
655:
403:
320:
195:
269:
238:
358:
93:
46:
219:
203:
593:
544:
290:
254:
438:
171:
622:
2010 Fifth
International Conference on Risks and Security of Internet and Systems (CRiSIS)
8:
230:
191:
140:
647:
506:
487:
385:
433:(Technical report). Anti-Tamper and Software Protection Initiative Technology Office,
637:
599:
550:
523:
375:
337:
296:
152:
144:
651:
464:
629:
515:
491:
479:
389:
367:
360:
Proceedings of the tenth annual ACM workshop on
Digital rights management - DRM '10
329:
163:
259:
242:
234:
207:
187:
179:
148:
633:
333:
199:
175:
483:
679:
357:
Cappaert, J.; Preneel, B. (2010). "A general model for hiding control flow".
371:
289:
Arnold, Michael; Schmucker, Martin; Wolthusen, Stephen D. (1 January 2003).
292:
Techniques and
Applications of Digital Watermarking and Content Protection
136:
519:
328:. Lecture Notes in Computer Science. Vol. 5824. pp. 125–139.
223:
211:
156:
514:. Lecture Notes in Computer Science. Vol. 2851. pp. 1–13.
35:
167:
215:
264:
618:
174:, disabling security monitoring, subverting authentication,
159:
between attackers and software anti-tampering technologies.
505:
Oorschot, P. C. (2003). "Revisiting
Software Protection".
288:
318:
155:
software anti-tampering methods; thus, the field is an
60:. Unsourced material may be challenged and removed.
282:
677:
166:code and behaviour. Examples include installing
356:
427:State of the Practice of Software Anti-Tamper
322:Advances in Information and Computer Security
465:"Semi-automatic binary protection tampering"
462:
585:
120:Learn how and when to remove this message
536:
504:
423:
14:
678:
569:
591:
542:
314:
312:
58:adding citations to reliable sources
29:
24:
25:
697:
549:. Cengage Learning. p. 135.
309:
218:. Some anti-tamper software uses
598:. No Starch Press. p. 400.
34:
612:
463:Guillot, Y.; Gazet, A. (2009).
424:Chaboya, David (20 June 2007).
45:needs additional citations for
570:Keller, John (26 April 2010).
563:
498:
456:
417:
396:
350:
13:
1:
435:Air Force Research Laboratory
295:. Artech House. p. 229.
275:
472:Journal in Computer Virology
404:"Keeping the Pirates at Bay"
7:
634:10.1109/CRISIS.2010.5764915
334:10.1007/978-3-642-04846-3_9
248:
196:cyclic redundancy checksums
10:
702:
686:Computer security software
595:Practical Malware Analysis
18:Software tamper protection
543:Davis, Steven B. (2008).
484:10.1007/s11416-009-0118-4
270:Digital rights management
239:digital rights management
202:measures, encryption or
574:. Militaryaerospace.com
372:10.1145/1866870.1866877
192:anti-virus applications
592:Honig, Andrew (2012).
231:anti-cheating in games
220:white-box cryptography
69:"Anti-tamper software"
255:Hardening (computing)
206:. Execution inside a
508:Information Security
133:Anti-tamper software
54:improve this article
444:on 27 December 2013
141:reverse engineering
520:10.1007/10958513_1
235:license management
643:978-1-4244-8641-0
605:978-1-59327-430-6
556:978-1-58450-687-4
529:978-3-540-20176-2
343:978-3-642-04845-6
302:978-1-58053-664-6
145:tamper resistance
130:
129:
122:
104:
16:(Redirected from
693:
670:
669:
667:
666:
660:
654:. Archived from
627:
616:
610:
609:
589:
583:
582:
580:
579:
567:
561:
560:
546:Protecting Games
540:
534:
533:
513:
502:
496:
495:
469:
460:
454:
453:
451:
449:
443:
437:. Archived from
432:
421:
415:
414:
412:
411:
400:
394:
393:
365:
354:
348:
347:
327:
316:
307:
306:
286:
188:malware scanners
164:computer program
125:
118:
114:
111:
105:
103:
62:
38:
30:
27:Type of software
21:
701:
700:
696:
695:
694:
692:
691:
690:
676:
675:
674:
673:
664:
662:
658:
644:
625:
617:
613:
606:
590:
586:
577:
575:
568:
564:
557:
541:
537:
530:
511:
503:
499:
467:
461:
457:
447:
445:
441:
430:
422:
418:
409:
407:
402:
401:
397:
382:
363:
355:
351:
344:
325:
317:
310:
303:
287:
283:
278:
260:Fault tolerance
251:
243:Mariposa botnet
208:virtual machine
180:software piracy
153:provably secure
149:copy protection
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
699:
689:
688:
672:
671:
642:
611:
604:
584:
562:
555:
535:
528:
497:
478:(2): 119–149.
455:
416:
395:
380:
366:. p. 35.
349:
342:
308:
301:
280:
279:
277:
274:
273:
272:
267:
262:
257:
250:
247:
237:software, and
200:anti-debugging
176:malicious code
128:
127:
42:
40:
33:
26:
9:
6:
4:
3:
2:
698:
687:
684:
683:
681:
661:on 2012-09-16
657:
653:
649:
645:
639:
635:
631:
628:. p. 1.
624:
623:
615:
607:
601:
597:
596:
588:
573:
566:
558:
552:
548:
547:
539:
531:
525:
521:
517:
510:
509:
501:
493:
489:
485:
481:
477:
473:
466:
459:
440:
436:
429:
428:
420:
405:
399:
391:
387:
383:
381:9781450300919
377:
373:
369:
362:
361:
353:
345:
339:
335:
331:
324:
323:
315:
313:
304:
298:
294:
293:
285:
281:
271:
268:
266:
263:
261:
258:
256:
253:
252:
246:
244:
240:
236:
232:
227:
225:
221:
217:
213:
209:
205:
201:
197:
193:
189:
183:
181:
177:
173:
169:
165:
160:
158:
154:
150:
146:
142:
138:
134:
124:
121:
113:
110:December 2013
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
663:. Retrieved
656:the original
621:
614:
594:
587:
576:. Retrieved
565:
545:
538:
507:
500:
475:
471:
458:
446:. Retrieved
439:the original
426:
419:
408:. Retrieved
398:
359:
352:
321:
291:
284:
233:, military,
228:
184:
161:
132:
131:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
448:24 December
406:. Gamasutra
204:obfuscation
137:obfuscation
665:2015-09-04
578:2013-12-24
410:2013-12-24
276:References
80:newspapers
224:Diablo II
212:StarForce
172:backdoors
157:arms race
680:Category
652:12673670
249:See also
168:rootkits
139:to make
492:7165477
390:3755320
216:SecuROM
94:scholar
650:
640:
602:
553:
526:
490:
388:
378:
340:
299:
265:Denuvo
96:
89:
82:
75:
67:
659:(PDF)
648:S2CID
626:(PDF)
512:(PDF)
488:S2CID
468:(PDF)
442:(PDF)
431:(PDF)
386:S2CID
364:(PDF)
326:(PDF)
101:JSTOR
87:books
638:ISBN
600:ISBN
551:ISBN
524:ISBN
450:2013
376:ISBN
338:ISBN
297:ISBN
214:and
190:and
170:and
73:news
630:doi
516:doi
480:doi
368:doi
330:doi
56:by
682::
646:.
636:.
522:.
486:.
474:.
470:.
384:.
374:.
336:.
311:^
245:.
198:,
668:.
632::
608:.
581:.
559:.
532:.
518::
494:.
482::
476:5
452:.
413:.
392:.
370::
346:.
332::
305:.
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.