Cryptographic checksums or secured modification-time
information are used to detect changes to information just before the
information is interpreted. Examples include several products on the market
and experimental systems.
objective of an integrity shell is to drive up the complexity of a
corruptive attack by forcing the attacker to make a modification that
retains an identical cryptographic checksum. The complexity of attack is
then tied to the complexity of breaking the cryptographic system.