State of the Practice of Software Anti-Tamper
Abstract:
Introduction AT-SPI Background, Understanding the RE Threat, Software Protection Techniques, Protection Case Studies, Software Protection Vendors, and Conclusion.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release;
RECORD
Collection: TR