Tamper-Tolerant Software: Modeling and Implementation
نویسندگان
چکیده
Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produce a crash or gradual failure, rendering the application unusable or troublesome. Such a response is designed to complicate attacks, but has also caused problems for developers and end users, particularly when bugs or other problems invoke anti-tampering measures accidentally. To address these issues, an alternative approach is to detect and fix malicious changes. This paper presents a scheme to transform programs into tamper-tolerant versions that use self-correcting operation as a response against attacks. Combining techniques from the fields of fault tolerance and software security, the approach transforms programs via code individualization and redundancy. We also describe security enhancements through error correction, delayed responses and checkpointing. For security analysis, we adapt a graph-based model of attacks and defenses in the context of software tamper-resistance. This helps to estimate the difficulty of breaking our scheme in practical scenarios.
منابع مشابه
Impact of Tamper Shape on the Efficiency and Vibrations Induced During Dynamic Compaction of Dry Sands by 3D Finite Element Modeling
Dynamic compaction is a soil improvement method which has been widely used for the increase of bearing capacity through stress wave propagation during heavy tamping. The cost and time of project implementation can be effectively curtailed by developing a model that can be used in the design of dynamic compaction operations. The numerical models offered so far are mostly one or two-dimensional, ...
متن کاملA Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملTamper Resistant Software Through Dynamic Integrity Checking
Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...
متن کاملFault-tolerant adder design in quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are an emerging technology and a possible alternative for faster speed, smaller size, and low power consumption than semiconductor transistor based technologies. Previously, adder designs based on conventional designs were examined for implementation with QCA technology. This paper utilizes the QCA characteristics to design a fault-tolerant adder that is more...
متن کامل