Software tampering 

Software tampering involves making modifications to the application's code before or while it is running. By changing an application's code in memory or on the hard drive, protective controls can be bypassed. Through reverse engineering, application functions can be studied and altered. These modifications can, for example allow the attacker to bypass authentication mechanisms, or circumvent licensing restrictions. Also, a device's firmware can be altered to allow an attacker backdoor access to the inner workings of a device. With that kind of access, the attacker can then search for more vulnerabilities within areas of the firmware that are normally not accessible. As an example, back in 2015 the ICS security company, ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.