Chapter Eight

A Taxonomy of Software Integrity Protection Techniques

Mohsen Ahmadvand*; Alexander Pretschner*; Florian Kelbert    * Technical University of Munich, Munich, Germany Imperial College London, London, United Kingdom


Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to security circumvention, privacy violation, reputation damage, and revenue loss. In this model, adversaries are end users who have full control over software as well as its execution environment. This full control enables them to tamper with programs to their benefit and to the detriment of software vendors or other end users. Software integrity protection research seeks for means to mitigate those attacks. Since the ...

Get Advances in Computers now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.