Software control and intellectual property protection in cyber-physical systems
نویسندگان
چکیده
Software control is a critical issue in cyber-physical systems (CPS): if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be in jeopardy. Thus, CPS stakeholders like having some level of control over the embedded software. Third-party demands to control the software, however, conflict with the intellectual property protection demanded by software developers, since some level of detail about the software at hand would have to be disclosed. In the present paper we discuss the issue of controlling the software embedded in CPS devices and address the problem of how to achieve an increased level of software control without compromising the protection of intellectual property. We propose a two-party fingerprinting scheme that allows for attribution of responsibility in the case of intellectual property leaks. Our fingerprinting scheme is such that neither party may obtain an advantage over the other by misbehaving, misrepresenting or by prematurely aborting the protocol, therefore providing a fair means to resolve disputes. A preliminary version of this paper has been published in the Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES’2015), pp. 110– 119. Research partially supported by FAPERJ, Capes and CNPq. Raphael C. S. Machado Instituto Nacional de Metrologia, Qualidade e Tecnologia Davidson R. Boccardo Instituto Nacional de Metrologia, Qualidade e Tecnologia Vińıcius G. Pereira de Sá Universidade Federal do Rio de Janeiro Jayme L. Szwarcfiter Universidade Federal do Rio de Janeiro 2 Raphael C. S. Machado et al.
منابع مشابه
Fault Effect Modeling in a Heterogeneous SystemC Virtual Platform Framework for Cyber-Physical Systems (WiP)
Cyber-physical and embedded systems applications, such as real-time control, are increasingly implemented on SWintensive architectures. Today, electronic system level design flows [6] for such systems are typically model-based and platform-based, that is, development starts from a specification model of the application which needs to be mapped to a platform of generic and custom intellectual pr...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملTrojan Detection and Side-Channel Analyses for Cyber-Security in Cyber-Physical Manufacturing Systems
As the maliciousness and frequency of cyber-attacks continues to grow, the safety and security of cyber-physical critical infrastructures, such as manufacturing, is quickly becoming a significant concern across the globe. Outside of traditional intellectual property theft, attacks against manufacturing systems pose a threat to maintaining a product’s design intent. More specifically, such attac...
متن کاملNecessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis
Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...
متن کاملMultifactor Authentication for Software Protection
Software protection is a mechanism to make software systems more difficult (or impossible) to be accessed by attackers. Such mechanisms are gaining more importance nowadays for increasing number of attacks on the software systems in the large internet networked environment. Hence, in this paper, two schemes are proposed to achieve effective software protection tools. They are based on the use o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EURASIP J. Information Security
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016