Tampering of electronic equipment may be detected by repeatedly
instructing the electronic equipment to perform different computational
operations, such as sequences of hashing operations, on a known software
image. Tampering of the electronic equipment may also be detected by
dividing the known software image into software image portions and
repeatedly instructing the electronic equipment to perform computational
operations on randomly-ordered software image portions, which may
correspond to hashing orders. Hash results may be produced which
correspond to a particular sequence of operations and order. Tampering
may be detected by comparing the hash results to corresponding secure
hash results produced on secure electronic equipment.