Abstract:
An integrity verification process is described to detect tampering or alteration to computer files, being especially useful for detection of tampepng by hackers trying to plant malicious code in software Each computer file to be protected is first selected using a rule and is partitioned into vapable length portions, the lengths varying in an unpredictable manner Each portion has its checksum or hash value computed A vepfication file is created which includes a vector for each portion including the portion's start address in memory, length, and computed checksum or hash value When the code is executed, the vepfication file is conventionally read and each portion is vepfied by computing its checksum or hash value again, and compapng that to the value in the associated vepfication file vector Lack of a match in the two values indicates tampepng, so execution of the code can be halted