References

[1] Collberg C.S., Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 2002;28(8):735–746.

[2] Akhunzada A., Sookhak M., Anuar N.B., Gani A., Ahmed E., Shiraz M., Furnell S., Hayat A., Khan M.K. Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 2015;48:44–57.

[3] Wurster G., Van Oorschot P.C., Somayaji A. A generic attack on checksumming-based software tamper resistance. In: 2005:0769523390127–135. doi:10.1109/SP.2005.2. Proceedings - IEEE Symposium on Security and Privacy. 10816011.

[4] Van Oorschot P.C., Somayaji A., Wurster G. Hardware-assisted circumvention of self-hashing software tamper resistance ...

Get Advances in Computers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.