Failures of Tamper-Proofing in PIN Entry Devices
نویسندگان
چکیده
منابع مشابه
Tamper-proofing Software Watermarks
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
متن کاملTamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermarks are embedded using clusters points, where a bit is encoded in each cluster. The four point encoding mechanism uses a combination of one point encoding and three point encoding schemes. Using these schemes it is poss...
متن کاملSvd-based Tamper Proofing of Multi-attribute Motion Data
Repositories of motion captured (MoCap) data can be reused for human motion analysis in physical medicine, biomechanics and animation related entertainment industry. MoCap data expressed as a matrix Mm x n can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of archived motion data intentionally or due to machine/huma...
متن کاملEvaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks
For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...
متن کاملWatermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy Magazine
سال: 2009
ISSN: 1540-7993
DOI: 10.1109/msp.2009.187