Knowledge

Anti-tamper software

Source 📝

36: 241:(DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them. Malicious software itself can and has been observed using anti-tampering techniques, for example the 222:, so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger. A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified. A simple (and easily defeated) scheme of this kind was used in the 194:. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as 185:
Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as
182:, code interference to extract data or algorithms and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance. 151:
and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no
571: 229:
Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems,
178:
injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of
226:
video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.
620: 143:
difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified. It is essentially
17: 425: 100: 72: 572:"Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics" 162:
Tampering can be malicious, to gain control over some aspect of the software with an unauthorized modification that alters the
641: 603: 554: 527: 341: 300: 53: 79: 685: 86: 379: 119: 619:
Sinha, P.; Boukhtouta, A.; Belarde, V. H.; Debbabi, M. (2010). "Insights from the analysis of the Mariposa botnet".
319:
Jakubowski, M. H.; Saw, C. W. (N.); Venkatesan, R. (2009). "Tamper-Tolerant Software: Modeling and Implementation".
68: 210:
has become a common anti-tamper method used in recent years for commercial software; it is used for example in
57: 147:
implemented in the software domain. It shares certain aspects but also differs from related technologies like
434: 135:
is software which makes it harder for an attacker to modify it. The measures involved can be passive such as
655: 403: 320: 195: 269: 238: 358: 93: 46: 219: 203: 593: 544: 290: 254: 438: 171: 622:
2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)
8: 230: 191: 140: 647: 506: 487: 385: 433:(Technical report). Anti-Tamper and Software Protection Initiative Technology Office, 637: 599: 550: 523: 375: 337: 296: 152: 144: 651: 464: 629: 515: 491: 479: 389: 367: 360:
Proceedings of the tenth annual ACM workshop on Digital rights management - DRM '10
329: 163: 259: 242: 234: 207: 187: 179: 148: 633: 333: 199: 175: 483: 679: 357:
Cappaert, J.; Preneel, B. (2010). "A general model for hiding control flow".
371: 289:
Arnold, Michael; Schmucker, Martin; Wolthusen, Stephen D. (1 January 2003).
292:
Techniques and Applications of Digital Watermarking and Content Protection
136: 519: 328:. Lecture Notes in Computer Science. Vol. 5824. pp. 125–139. 223: 211: 156: 514:. Lecture Notes in Computer Science. Vol. 2851. pp. 1–13. 35: 167: 215: 264: 618: 174:, disabling security monitoring, subverting authentication, 159:
between attackers and software anti-tampering technologies.
505:
Oorschot, P. C. (2003). "Revisiting Software Protection".
288: 318: 155:
software anti-tampering methods; thus, the field is an
60:. Unsourced material may be challenged and removed. 282: 677: 166:code and behaviour. Examples include installing 356: 427:State of the Practice of Software Anti-Tamper 322:Advances in Information and Computer Security 465:"Semi-automatic binary protection tampering" 462: 585: 120:Learn how and when to remove this message 536: 504: 423: 14: 678: 569: 591: 542: 314: 312: 58:adding citations to reliable sources 29: 24: 25: 697: 549:. Cengage Learning. p. 135. 309: 218:. Some anti-tamper software uses 598:. No Starch Press. p. 400. 34: 612: 463:Guillot, Y.; Gazet, A. (2009). 424:Chaboya, David (20 June 2007). 45:needs additional citations for 570:Keller, John (26 April 2010). 563: 498: 456: 417: 396: 350: 13: 1: 435:Air Force Research Laboratory 295:. Artech House. p. 229. 275: 472:Journal in Computer Virology 404:"Keeping the Pirates at Bay" 7: 634:10.1109/CRISIS.2010.5764915 334:10.1007/978-3-642-04846-3_9 248: 196:cyclic redundancy checksums 10: 702: 686:Computer security software 595:Practical Malware Analysis 18:Software tamper protection 543:Davis, Steven B. (2008). 484:10.1007/s11416-009-0118-4 270:Digital rights management 239:digital rights management 202:measures, encryption or 574:. Militaryaerospace.com 372:10.1145/1866870.1866877 192:anti-virus applications 592:Honig, Andrew (2012). 231:anti-cheating in games 220:white-box cryptography 69:"Anti-tamper software" 255:Hardening (computing) 206:. Execution inside a 508:Information Security 133:Anti-tamper software 54:improve this article 444:on 27 December 2013 141:reverse engineering 520:10.1007/10958513_1 235:license management 643:978-1-4244-8641-0 605:978-1-59327-430-6 556:978-1-58450-687-4 529:978-3-540-20176-2 343:978-3-642-04845-6 302:978-1-58053-664-6 145:tamper resistance 130: 129: 122: 104: 16:(Redirected from 693: 670: 669: 667: 666: 660: 654:. Archived from 627: 616: 610: 609: 589: 583: 582: 580: 579: 567: 561: 560: 546:Protecting Games 540: 534: 533: 513: 502: 496: 495: 469: 460: 454: 453: 451: 449: 443: 437:. Archived from 432: 421: 415: 414: 412: 411: 400: 394: 393: 365: 354: 348: 347: 327: 316: 307: 306: 286: 188:malware scanners 164:computer program 125: 118: 114: 111: 105: 103: 62: 38: 30: 27:Type of software 21: 701: 700: 696: 695: 694: 692: 691: 690: 676: 675: 674: 673: 664: 662: 658: 644: 625: 617: 613: 606: 590: 586: 577: 575: 568: 564: 557: 541: 537: 530: 511: 503: 499: 467: 461: 457: 447: 445: 441: 430: 422: 418: 409: 407: 402: 401: 397: 382: 363: 355: 351: 344: 325: 317: 310: 303: 287: 283: 278: 260:Fault tolerance 251: 243:Mariposa botnet 208:virtual machine 180:software piracy 153:provably secure 149:copy protection 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 699: 689: 688: 672: 671: 642: 611: 604: 584: 562: 555: 535: 528: 497: 478:(2): 119–149. 455: 416: 395: 380: 366:. p. 35. 349: 342: 308: 301: 280: 279: 277: 274: 273: 272: 267: 262: 257: 250: 247: 237:software, and 200:anti-debugging 176:malicious code 128: 127: 42: 40: 33: 26: 9: 6: 4: 3: 2: 698: 687: 684: 683: 681: 661:on 2012-09-16 657: 653: 649: 645: 639: 635: 631: 628:. p. 1. 624: 623: 615: 607: 601: 597: 596: 588: 573: 566: 558: 552: 548: 547: 539: 531: 525: 521: 517: 510: 509: 501: 493: 489: 485: 481: 477: 473: 466: 459: 440: 436: 429: 428: 420: 405: 399: 391: 387: 383: 381:9781450300919 377: 373: 369: 362: 361: 353: 345: 339: 335: 331: 324: 323: 315: 313: 304: 298: 294: 293: 285: 281: 271: 268: 266: 263: 261: 258: 256: 253: 252: 246: 244: 240: 236: 232: 227: 225: 221: 217: 213: 209: 205: 201: 197: 193: 189: 183: 181: 177: 173: 169: 165: 160: 158: 154: 150: 146: 142: 138: 134: 124: 121: 113: 110:December 2013 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 663:. Retrieved 656:the original 621: 614: 594: 587: 576:. Retrieved 565: 545: 538: 507: 500: 475: 471: 458: 446:. Retrieved 439:the original 426: 419: 408:. Retrieved 398: 359: 352: 321: 291: 284: 233:, military, 228: 184: 161: 132: 131: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 448:24 December 406:. Gamasutra 204:obfuscation 137:obfuscation 665:2015-09-04 578:2013-12-24 410:2013-12-24 276:References 80:newspapers 224:Diablo II 212:StarForce 172:backdoors 157:arms race 680:Category 652:12673670 249:See also 168:rootkits 139:to make 492:7165477 390:3755320 216:SecuROM 94:scholar 650:  640:  602:  553:  526:  490:  388:  378:  340:  299:  265:Denuvo 96:  89:  82:  75:  67:  659:(PDF) 648:S2CID 626:(PDF) 512:(PDF) 488:S2CID 468:(PDF) 442:(PDF) 431:(PDF) 386:S2CID 364:(PDF) 326:(PDF) 101:JSTOR 87:books 638:ISBN 600:ISBN 551:ISBN 524:ISBN 450:2013 376:ISBN 338:ISBN 297:ISBN 214:and 190:and 170:and 73:news 630:doi 516:doi 480:doi 368:doi 330:doi 56:by 682:: 646:. 636:. 522:. 486:. 474:. 470:. 384:. 374:. 336:. 311:^ 245:. 198:, 668:. 632:: 608:. 581:. 559:. 532:. 518:: 494:. 482:: 476:5 452:. 413:. 392:. 370:: 346:. 332:: 305:. 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Software tamper protection

verification
improve this article
adding citations to reliable sources
"Anti-tamper software"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
obfuscation
reverse engineering
tamper resistance
copy protection
provably secure
arms race
computer program
rootkits
backdoors
malicious code
software piracy
malware scanners
anti-virus applications
cyclic redundancy checksums
anti-debugging
obfuscation
virtual machine
StarForce

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.