Towards Checking Tampering of Software
نویسندگان
چکیده
Measuring integrity of software after deployment is important to ensure that software is not tampered with. Software tampering problem manifests itself in different ways: (i) done by an attacker to harm the user/system (e.g., infection by virus), and (ii) done by the user himself to use the software in ways that the creator of software did not intend/permit (e.g., tamper the software to bypass checks for subscription). In either case, software tampering can result in a great loss to resources, reputation, etc. and is a serious problem that demands robust solutions. Software providers would want to measure integrity of their software and also the environment in which it executes. This would help to ensure that the user does not tamper with the software so as to use it in unintended ways. For example, unlocking certain restricted features in a demo version. In Kosar, Christodorescu, & Iverson (2003), authors present a mechanism to bypass license checks usABSTRACT
منابع مشابه
Towards a Formal Model for Software Tamper Resistance
A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...
متن کاملCombining ENF Phase Discontinuity Checking and Temporal Pattern Matching for Audio Tampering Detection
In this paper, we present an improved approach for audio tampering detection and localization based on the Electrical Network Frequency (ENF) analysis, combining analysis of the ENF phase, and ENF temporal pattern matching: The proposed algorithm uses phase discontinuity checking to detect regions that might have been tampered, which are then matched against an ENF reference database to validat...
متن کاملTamper Protection of Online Clients through Random Checksum Algorithms
We describe a new purely software-based, self-checking mechanism designed to prevent tampering of client programs in client/server-applications like online-games, peer-to-peer networks, or online auction systems. Our mechanism consists of randomly creating checksum algorithms at the server. The checksum algorithms are integrated into autonomous short-lived software code, called Mobile Guards, w...
متن کاملN-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity
Tamper-resistance is a fundamental software security research area. Many approaches have been proposed to thwart specific procedures of tampering, e.g., obfuscation and self-checksumming. However, to our best knowledge, none of them can achieve theoretically tamper-resistance. Our idea is to impede the replication of tampering via program diversification, and thus increasing the complexity to b...
متن کاملTowards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tamper detection. In this paper we propose a tamper resistance technique which provides both on and offline tamper detection. In our offline approach, the software dynamically detects tamperi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011