• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Chaokun, Fu Junning, Wang Jianmin, Yu Zhiwei. Survey of Software Tamper Proofing Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 923-933.
Citation: Wang Chaokun, Fu Junning, Wang Jianmin, Yu Zhiwei. Survey of Software Tamper Proofing Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 923-933.

Survey of Software Tamper Proofing Technique

More Information
  • Published Date: June 14, 2011
  • With the wide use of computer technologies, software has become indispensable in our daily life and the corresponding security issues in software systems are more and more prominent. Especially, how to design a practical protection scheme is quite important and has great significance in the software research and development industries. As one of the key methods for software protection, the software tamper proofing technique attracts much attention from researchers both at home and abroad in recent years. Such technique aims at preventing the critical program information from the unauthorized modifications and uses, and also at generating the responses once the tampering is detected. Presented in this paper is a review of the analysis of software tamper proofing. In our discussion, different tamper proofing methods are classified into two categories: the static tamper proofing methods based on the code obfuscation as well as the dynamic tamper proofing methods based on the verification-response. The advantages and disadvantages, strengths and weaknesses of these methods are presented in detail. In the end, through the survey of these tamper proofing techniques, a summary is obtained which includes not only the characteristics, but also the existing problems and future work of the software tamper proofing technique.
  • Related Articles

    [1]Li Dongwen, Zhong Zhenyu, Sun Yufei, Shen Junyu, Ma Zizhi, Yu Chuanyue, Zhang Yuzhi. LingLong: A High-Quality Small-Scale Chinese Pre-trained Language Model[J]. Journal of Computer Research and Development, 2025, 62(3): 682-693. DOI: 10.7544/issn1000-1239.202330844
    [2]Cui Yuanning, Sun Zequn, Hu Wei. A Pre-trained Universal Knowledge Graph Reasoning Model Based on Rule Prompts[J]. Journal of Computer Research and Development, 2024, 61(8): 2030-2044. DOI: 10.7544/issn1000-1239.202440133
    [3]Chen Rui, Wang Zhanquan. Uni-LSDPM: A Unified Online Learning Session Dropout Prediction Model Based on Pre-Training[J]. Journal of Computer Research and Development, 2024, 61(2): 441-459. DOI: 10.7544/issn1000-1239.202220834
    [4]Zhang Naizhou, Cao Wei, Zhang Xiaojian, Li Shijun. Conversation Generation Based on Variational Attention Knowledge Selection and Pre-trained Language Model[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440551
    [5]Wang Qi, Li Deyu, Zhai Yanhui, Zhang Shaoxia. Parameterized Fuzzy Decision Implication[J]. Journal of Computer Research and Development, 2022, 59(9): 2066-2074. DOI: 10.7544/issn1000-1239.20210539
    [6]Zhang Dongjie, Huang Longtao, Zhang Rong, Xue Hui, Lin Junyu, Lu Yao. Fake Review Detection Based on Joint Topic and Sentiment Pre-Training Model[J]. Journal of Computer Research and Development, 2021, 58(7): 1385-1394. DOI: 10.7544/issn1000-1239.2021.20200817
    [7]Zhang Chao, Li Deyu. Interval-Valued Hesitant Fuzzy Graphs Decision Making with Correlations and Prioritization Relationships[J]. Journal of Computer Research and Development, 2019, 56(11): 2438-2447. DOI: 10.7544/issn1000-1239.2019.20180314
    [8]Cheng Xiaoyang, Zhan Yongzhao, Mao Qirong, Zhan Zhicai. Video Semantic Analysis Based on Topographic Sparse Pre-Training CNN[J]. Journal of Computer Research and Development, 2018, 55(12): 2703-2714. DOI: 10.7544/issn1000-1239.2018.20170579
    [9]Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785
    [10]Wang Jing, Wang Lili, and Li Shuai. Pre-Computed Radiance Transport All-Frequency Shadows Algorithm on GPU[J]. Journal of Computer Research and Development, 2006, 43(9): 1505-1510.

Catalog

    Article views (1224) PDF downloads (731) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return