< Terug naar vorige pagina
The detailed objectives of this track are as follows: a) Provide techniques that preserve deployed software from malicious modifications by detecting tampering if it occurs. To do so, self-checking techniques will be studied and improved. b) Provide techniques to avoid tampering of deployed software by making the analysis of the application harder via a combination of techniques. This includes the study and improvement of self-modifying code, encrypted code execution and encrypted data processing, and code obfuscation and white-box cryptography. c) Provide techniques to remotely attest the integrity of deployed application software.
Datum:1 okt 2008 → 30 nov 2012
Trefwoorden:Secure software, Distributed applications