How to Counter Control Flow Tampering Attacks.
Mohsen SharifiMohammad ZoroufiAlireza SaberiPublished in: AICCSA (2007)
Keyphrases
- control flow
- java card
- watermarking scheme
- data flow
- detecting malicious
- malicious attacks
- robust watermarking scheme
- process model
- digital images
- forensic analysis
- software testing
- copyright protection
- watermarking technique
- workflow management systems
- transition systems
- modeling language
- jpeg compression
- digital watermarking
- reverse engineering
- watermark embedding
- business process models
- image watermarking
- formal semantics
- authentication scheme
- data sets
- watermarking method
- workflow processes
- case study