top | item 15216752

(no title)

AlyssaRowan | 8 years ago

Yes.

This kind of technique, and the exploitation of minor CPU errata, can be used to help differentiate processor models and steppings.

That in turn allows a currently widespread DRM system to download personalised portions of object code that rely on properties specific to the licensed hardware in order to execute properly, in an attempt to counter debugging, emulation and transfer - continuing a tradition practised in copy protection techniques since at least the 6502, maybe even earlier.

discuss

order

amelius|8 years ago

Is there a term for that, similar to "security by obscurity"?

Open-Sourcery|8 years ago

how does "Identification by exploitation" sound.