Side-channel Programming for Software Integrity Checking

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gray-box Software Integrity Checking via Side-channels

Enforcing software integrity is a challenge in embedded systems which cannot employ modern protection mechanisms. In this paper, we explore feasibility of software integrity checking from measuring passive electromagnetic emissions of FPGA-implemented SoCs. We show that clock-cycle-accurate side-channel models can be built by utilizing gray-box analysis and regression techniques. The generality...

متن کامل

Tamper Resistant Software Through Dynamic Integrity Checking

Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...

متن کامل

Efficient Integrity Checking for Essential MOF + OCL in Software Repositories

The efficient detection of run-time violations of integrity constraints (or their avoidance in the first place) has not been satisfactorily addressed for the combination of object model and constraint definition language most widely accepted in industry, namely OMG’s Essential MOF and Object Constraint Language (OCL). We identify the dimensions relevant to this problem, and classify existing pr...

متن کامل

Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection

We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail ...

متن کامل

Remote data integrity checking with server-side repair

Distributed storage systems store data redundantly at multiple servers that are geographically spread throughout the world. This basic approach would be sufficient in handling server failure due to natural faults, because when one server fails, data from healthy servers can be used to restore the desired redundancy level. However, in a setting where servers are untrusted and can behave maliciou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ICST Transactions on Security and Safety

سال: 2021

ISSN: 2032-9393

DOI: 10.4108/eai.2-6-2021.170013