A number of systems and methods, alone, or in combination, achieve various
levels of protection against unauthorized modification and distribution
of digital content. This encompasses at least unauthorized study,
modification, monitoring, reconstruction, and any other means for
subversion from the originally intended purpose and license model of the
digital content. The invention combines a number of techniques that in
whole, or in part, serve to protect such content from unauthorized
modification, reconstructive engineering, or monitoring by third parties.
This is accomplished by means of methods which protect against subversion
by specific tools operating on specific platforms as well as general
tools operating on general platforms. Specific time domain attacks are
identified, code modification can be identified and reversed, and virtual
and emulated systems are identified. In addition, identification of
in-circuit emulator tools (both software and hardware), debuggers, and
security threats to running programs can be achieved.