Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
نویسندگان
چکیده
We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail with some probability for any invalid execution (e.g., when the output value of one of the variables is tampered). PVCs work with straight-line integer programs that have operations { ∗, +,− }. We also sketch how we can extend this class to include branches and loops. FLAs can work over programs with arbitrary operations, but have some limitations in terms of efficiency, code size, and ability to handle various classes of functions. We describe a few applications of this technique, such as program integrity checking, program or client identification, and tamper detection. As a generalization of oblivious hashing (OH), our approach resolves several troublesome issues that complicate practical application of OH towards
منابع مشابه
Towards Checking Tampering of Software
Measuring integrity of software after deployment is important to ensure that software is not tampered with. Software tampering problem manifests itself in different ways: (i) done by an attacker to harm the user/system (e.g., infection by virus), and (ii) done by the user himself to use the software in ways that the creator of software did not intend/permit (e.g., tamper the software to bypass ...
متن کاملTamper Resistant Software Through Dynamic Integrity Checking
Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...
متن کاملDynamic Self-Checking Techniques for Improved Tamper Resistance
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes s...
متن کاملHybrid Robust Watermarking Resistant
Three major aspects in the protection of digital documents have been pointed out, each of them with di erent requirements: rst copyright protection, protecting ownership and usage rights; secondly tamper-proo ng, aiming at checking document integrity; and thirdly authentication, the purpose of which is to check the authenticity of a document. While robust watermarks are typically used for copyr...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007