User Guide

  • 2020
  • 10/21/2020
  • Public Content

Troubleshooting Tamper-resistance Issues


When you run an
Intel Inspector
analysis, the application:
  • Reports symptoms of unauthorized use.
  • Disables features.
  • Terminates execution.


Intel Inspector
uses dynamic binary instrumentation technology to identify issues and collect results. An application may implement runtime checks to ensure it is not used in unintended ways. Typically such checks ensure you do not tamper with license checking, digital rights management (DRM), or other security-related features. An application implementing such checks may incorrectly identify dynamic binary instrumentation technology as evidence of tampering.

Possible Correction Strategies

If possible, turn off tamper-resistance features during application development when the
Intel Inspector
is used. Otherwise, build the application in such a way that it is possible to debug by attaching a debugger, setting breakpoints, and stepping through the code.

Product and Performance Information


Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice.

Notice revision #20110804