Towards Checking Tampering of Software

Towards Checking Tampering of Software

N.V.Narendra Kumar, Harshit Shah, R.K. Shyamasundar
ISBN13: 9781609601232|ISBN10: 1609601238|EISBN13: 9781609601256
DOI: 10.4018/978-1-60960-123-2.ch014
Cite Chapter Cite Chapter

MLA

Kumar, N.V.Narendra, et al. "Towards Checking Tampering of Software." Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, et al., IGI Global, 2011, pp. 204-219. https://doi.org/10.4018/978-1-60960-123-2.ch014

APA

Kumar, N., Shah, H., & Shyamasundar, R. (2011). Towards Checking Tampering of Software. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.), Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 204-219). IGI Global. https://doi.org/10.4018/978-1-60960-123-2.ch014

Chicago

Kumar, N.V.Narendra, Harshit Shah, and R.K. Shyamasundar. "Towards Checking Tampering of Software." In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, M. Sethumadhavan, and Mohit Virendra, 204-219. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-123-2.ch014

Export Reference

Mendeley
Favorite

Abstract

Assuring integrity of software is a very challenging issue. Different manifestations of tampering exist such as intentional attack with the aim of harming the user (through some kind of a malware; Baker, 1995) or the user himself tampers with the software to gain features he is not authorized with (Baxter, Yahin, Moura, Sant’Anna, & Bier, 1998). In this chapter, the authors make a survey of various strategies used to assure the integrity of software such as trusted computing platform, software attestation, software similarity, software watermark, software birthmark etc. Subsequently, the authors present a novel method for malware detection from a semantic approach that can be adapted for checking the integrity of software. They shall discuss some of the initial experimental results in this direction.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.