The protection of computer software---its technology and applications
Spending Programs: A Tool for Flexible Micropayments
ISW '99 Proceedings of the Second International Workshop on Information Security
Hi-index | 0.00 |
A new method is featured which solves the sofware integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signed/encrypted by an authority would require full decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure recording of a few of the last read instructions suffice in our case. A general use of the proposed system could practically prevent any viral attack with minimum authority operation.