A Survey of Binary Tamper-resistance Techniques for Software Protection
- DOI
- 10.2991/iceeecs-16.2016.96How to use a DOI?
- Keywords
- Software protection; Tamper-resistance; Check-respond mechanism
- Abstract
Software safety issues have become severe problems in modern information industry. Binary tamper-resistance techniques as an important means for software protection, have become a worldwide popular research topic. In this paper, we firstly introduce basic concepts of software cracking and protecting, aiming at the main targets of tamper-resistance, which is precisely detecting abnormal modifying behaviors beyond the range of normal functions. Secondly, we analyze various kinds of tamper-resistance techniques based on check-respond mechanism, which can react to modifications properly and effectively. Finally, we categorize different implementations and summarize their superiorities and limitations with an evaluation system. We also propose our expectations of the development prospect on tamper-resistance techniques.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xianya Mi AU - Yi Zhang AU - Baosheng Wang PY - 2016/12 DA - 2016/12 TI - A Survey of Binary Tamper-resistance Techniques for Software Protection BT - Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016) PB - Atlantis Press SP - 460 EP - 466 SN - 2352-538X UR - https://doi.org/10.2991/iceeecs-16.2016.96 DO - 10.2991/iceeecs-16.2016.96 ID - Mi2016/12 ER -