Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Detection of Tampering with Computer Executables

Project Summary

The distance between executable code and the source from which it was supposedly generated is almost invariably large. The object of the current research is to provide a closed-loop check of the deployed product against the original source.

Note: This effort was a subproject that began in 2000. It was last mentioned in the December 2000 six-month report. It appears that no funds were actually expended on behalf of this subproject. Nonetheless, work along these lines continued as the Ph.D. dissertation topic chosen by Michael Fromberger, with Doug McIlroy and Sean Smith as mentors.

  • Project Lead: Douglas McIlroy