نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Journal: :IACR Cryptology ePrint Archive 2012
Nico Döttling Daniel Kraschewski Jörn Müller-Quade

Cryptographic assumptions regarding tamper-proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even can be used to create so...

2001
Bill G. Horne Lesley R. Matheson Casey Sheehan Robert E. Tarjan

We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes s...

Journal: :International Journal of Telemedicine and Applications 2008

Journal: :CoRR 2010
Malik Sikandar Hayat Khiyal Aihab Khan Sehrish Amjad M. Shahid Khalil

For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...

2004
Ping Wang Kwangjo Kim

Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...

2008
Jin Li Kwangjo Kim

Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...

2015
Dennis Heimbigner

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-resistant interpreter for a programming language – currently Lisp 1.5 – combined with the use of a secure co-processor can address this problem. This solution executes the interpreter on the secure coprocessor while the code and data...

Journal: :Communications in computer and information science 2022

Abstract Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In role as an immutable ledger, it grown beyond initial use financial transactions used recording wide variety of other useful information. this paper, we explore application outside traditional decentralized, domain. We show how, even with only single “mining” node, proof-of-work can corners...

2010
Yogesh Sankarasubramaniam Badri Narayanan Kapali Viswanathan Anjaneyulu Kuchibhotla

This paper presents an algorithm called CIPDEC (Content Integrity of Printed Documents using Error Correction), which identifies any modifications made to a printed document. CIPDEC uses an error correcting code for accurate detection of addition/deletion of even a few pixels. A unique advantage of CIPDEC is that it works blind – it does not require the original document for such detection. Ins...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید