Back to Results
First PageMeta Content
Fault-tolerant computer systems / Technology / Packaging / Tamper resistance / Software quality / Application checkpointing / Copy protection / Error detection and correction / Encryption / Cryptography / Computing / Security


Tamper-Tolerant Software: Modeling and Implementation Mariusz H. Jakubowski† , Chit Wei (Nick) Saw† and Ramarathnam
Add to Reading List

Document Date: 2009-07-03 12:00:41


Open Document

File Size: 299,31 KB

Share Result on Facebook

City

Phoenix / /

Company

Microsoft Research India / Tamper-Tolerant Software / Microsoft / /

/

IndustryTerm

software tamper-resistance / security-sensitive applications / software protection / targeted applications / software bugs / fault-tolerant systems / software security / Web-based code / tamper-resistant software / checkpoint technology / transformation tool / database search / software-protection techniques / transportation scheduling / generic tool / software-protection systems / software piracy / /

Person

Chit Wei / /

Position

driver / graph-based security model for evaluating the strength / /

ProgrammingLanguage

V / DC / C / /

PublishedMedium

on SPEC / /

Technology

Encryption / RAM / 2.3 Tamper-Tolerance Algorithms / existing checkpoint technology / secret key / /

SocialTag