Storage jamming is the malicious modification of stored … the data. … [p. 366] The jammer's objective is to reduce the … . [p. 371] Specialized data integrity constraints can simplify … in computing plausible bogus values that satisfy them. … [across multiple domains]. [p. 372] Finally, detection objects are data structures … changed, then there is a high probability that … [Detection objects should be indistinguishable from protected data items, yet likely to be modified by any jammer]
Google-1
Google-2
Copyright clearance needed for quotation.