Software Anti-Tamper (AT) prevents the reverse engineering and exploitation of military critical software technologies in order to deter technology transfer, alteration of system capability, or the development of countermeasures to U.S. systems. AT is an emerging umbrella term that covers the process, activities, and materiel implementation(s) to protect U.S. military and business technology from compromise when that technology is associated with or made vulnerable to reverse engineering through Foreign Military Sales (FMS), Direct Commercial Sales (DCS), worldwide operations. 
The following steps are required by DoD policy and Milestone B criteria to establish software AT protection: 
- Identify potential software related critical technologies (CT) requiring
- Identify threats to the software.
- Identify vulnerabilities.
- Identify attack scenarios.
- Identify impacts if exploited.
- Identify exploitation timelines to minimize impacts.
- Perform risk analysis.
- Select from potential critical technologies those that must be protected.
- Identify the available potential AT techniques for each critical technology.
- Select potential implementations and perform risk assessment with each technique.
- Down-select to recommended protection solution.
- Develop the final AT plan and obtain AT plan approval.
AcqLinks and References:
-  USAF Weapon Systems Software Management Guidebook – Chapter 3
- DoD Instruction 5200.39 “CPI Identification and Protection Within RDT&E” – 17 Nov 2017
- Mil-STD-498 “Software Development and Documentation” – 5 Dec 1994
- MIL-STD-498 “Application and Reference Guidebook” – 3 Jan 1996
- Software Development Plan Information Outline
- Website: MIL-STD-498 Software Documentation