Method, a device and a computer program support for verification of checksums for self-modified computer code

作者: Charles Salmon-Legagneur , Antoine Monsifrot

DOI:

关键词:

摘要: A function of a software program is stored in memory during execution device the program. processor relocates region comprising dummy code, transforms code predictable manner, generates predicted checksum for based on previous checksum, calculated over region, and verifies integrity by comparing checksum. Also provided are computer product.

参考文章(23)
Peng Ning, Chongkyung Kil, Mechanisms for protecting software integrity in networked systems North Carolina State University. ,(2008)
George William Wilhelm, John Edward Fetkovich, Integrity checking of a relocated executable module loaded within memory ,(1999)
Daniel C. DuVarney, Sandeep Bhatkar, R. Sekar, Address obfuscation: an efficient approach to combat a board range of memory error exploits usenix security symposium. pp. 8- 8 ,(2003)
Pierre Betouin, Augustin J. Farrugia, Gianpaolo Fasoli, Julien Lerouge, Software or other information integrity verification using variable block length and selection ,(2008)
Ramarathnam Venkatesan, Mariusz H. Jakubowski, Protecting Digital Goods Using Oblivious Checking ,(2006)
Robert E. Tarjan, Susan S. Owicki, Lesley R. Matheson, W. Olin Sibert, James J. Horning, William G. Horne, Umeshi Maheshwari, Andrew K. Wright, Systems and methods for watermarking software and other media ,(2007)