References
- Dr. Mikhail J. Atallah, Eric D. Bryant, and Dr. Martin R. Stytz, "A survey of Anti-Tamper Techologies", CROSSTALK The Journal of Defense Software Engineering, pp. 13-16, November 2004.
- Gansler, J. S, "Implementation of anti-tamper (AT) techniques", DoD memorandum, March 1994.
- Anderson, R, and M. Kuhn, "Tamper Resistance - A Cautionary Note. Proc.of Second Usenix Workshop on Electronic Commerce", Oakland, CA, pp. 1-11. Nov. 1996.
- Arbaugh, W, D. Farber, and J. Smith, "A Secure and Reliable Bootstrap Architecture. Proc. of the IEEE Symposium on Security and Privacy", Oakland, CA, 1997.
- Lt Col Art Huber, Jennifer M. Scott, "The Role and Nature of Anti-Tamper Techniques in U.S. Defense Acquisition 357", Acquisition Review Quarterly, Fall 1999.
- Alvaro Ortega Chamorro, "Physical Protection : Anti-Tamper mechanisms in CC security evaluations", EPOCHE & ESPRI, Norway, 10ICCC.