Topic: hash table and hash functions
Topic: software maintenance by patching
Topic: monitored variable
Reference
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.,
"Oblivious hashing: A stealthy software integrity verification strategy", in Petitcolas, F.A.P. (ed.),
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 2002, Springer, LNCS 2578, pp. 400-414.
Google
Quotations
abstract ;;Quote: oblivious hashing is a hash function over assignments and control flows; verify software protection by hashing security-sensitive code paths
abstract+;;Quote: use C's comma operator to syntactically add code to assignments while preserving C semantics
Related Topics
Topic: hash table and hash functions (41 items)
Topic: software maintenance by patching (27 items)
Topic: monitored variable (28 items)