Side-channel Programming for Software Integrity Checking
نویسندگان
چکیده
منابع مشابه
Gray-box Software Integrity Checking via Side-channels
Enforcing software integrity is a challenge in embedded systems which cannot employ modern protection mechanisms. In this paper, we explore feasibility of software integrity checking from measuring passive electromagnetic emissions of FPGA-implemented SoCs. We show that clock-cycle-accurate side-channel models can be built by utilizing gray-box analysis and regression techniques. The generality...
متن کاملTamper Resistant Software Through Dynamic Integrity Checking
Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...
متن کاملEfficient Integrity Checking for Essential MOF + OCL in Software Repositories
The efficient detection of run-time violations of integrity constraints (or their avoidance in the first place) has not been satisfactorily addressed for the combination of object model and constraint definition language most widely accepted in industry, namely OMG’s Essential MOF and Object Constraint Language (OCL). We identify the dimensions relevant to this problem, and classify existing pr...
متن کاملSoftware Integrity Checking Expressions (ICEs) for Robust Tamper Detection
We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail ...
متن کاملRemote data integrity checking with server-side repair
Distributed storage systems store data redundantly at multiple servers that are geographically spread throughout the world. This basic approach would be sufficient in handling server failure due to natural faults, because when one server fails, data from healthy servers can be used to restore the desired redundancy level. However, in a setting where servers are untrusted and can behave maliciou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Security and Safety
سال: 2021
ISSN: 2032-9393
DOI: 10.4108/eai.2-6-2021.170013