Tamper resistance

Known as: Tamper-resistant, Tamper-resistance, Tamper proof 
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1991-2017
0204019912017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Many semiconductor chips used in a wide range of applications require protection against physical attacks or tamper resistance… (More)
  • figure 7.1
  • figure 7.2
  • figure 7.3
  • figure 7.4
  • figure 7.5
Is this relevant?
2009
2009
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2005
2005
Software protection is an area of active research in which a variety of techniques have been developed to address the issue… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2005
2005
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of this approach to software… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
  • 2000
The presence of aliases has been proven to restrict greatly the precision of static data-flow analysis. Meanwhile, effective… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2000
2000
We investigate a simple method of fraud management for secure devices that may serve as an alternative or complement to… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
There has been considerable recent interest in the level of tamper resistance that can be provided by low cost devices such as… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security… (More)
Is this relevant?