References

[1] Collberg C.S., Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 2002;28(8):735–746.

[2] Akhunzada A., Sookhak M., Anuar N.B., Gani A., Ahmed E., Shiraz M., Furnell S., Hayat A., Khan M.K. Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 2015;48:44–57.

[3] Wurster G., Van Oorschot P.C., Somayaji A. A generic attack on checksumming-based software tamper resistance. In: 2005:0769523390127–135. doi:10.1109/SP.2005.2. Proceedings - IEEE Symposium on Security and Privacy. 10816011.

[4] Van Oorschot P.C., Somayaji A., Wurster G. Hardware-assisted circumvention of self-hashing software tamper resistance ...

Get Advances in Computers now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.