Secure Application Partitioning for Intellectual Property Protection
نویسندگان
چکیده
Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application can only be run or accessed by authorized hosts. Unfortunately, these capabilities incur a sizeable performance overhead. Partitioning an application into secure and insecure regions can help diminish overheads but invalidates guarantees of privacy and access control. This work examines the problem of securely partitioning an application into public and private regions so that private code confidentiality is guaranteed and only authorized hosts can execute the application. This problem must be framed within the context of whole application execution for any solution to have meaning, which is a critical point when evaluating software security. The adversarial model presented balances practical generality with concrete security guarantees, and it is shown that under this model the best attack possible is a “Memoization Attack.” A practical Memoization Attack is implemented, and experimentation reveals that naive partitioning strategies can expose the functionality of hidden code in real applications, allowing unauthorized execution. To protect against such an attack, a set of indicators are presented that enable an application designer to identify these insecure application code regions. Finally, a partitioning methodology is discussed that uses these indicators to partition an application in a manner that protects the privacy of intellectual property and prohibits unauthorized execution. Thesis Supervisor: Srinivas Devadas Title: Professor of Electrical Engineering and Computer Science
منابع مشابه
Runtime Intellectual Property Protection on Programmable Platforms
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bit-stream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture ...
متن کاملNecessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis
Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...
متن کاملA comparison between Hardware and Software Solutions for Resource Partitioning in Multicore-based Mixed Criticality Applications
The paper proposes a comparison between hardware and software solutions for resource partitioning in the scenario of a multi-core based mixed criticality application. A reference avionic application has been implemented in two versions: one using a software partitioning solution and one using a hardware partitioning solution. Both versions of the system have been evaluated using fault injection...
متن کاملOn The Secure Evaluation Of Encrypted Polynomials Over Z/nZ DRAFT
An interesting application of cryptography is in the reduction of software piracy and the protection of intellectual property within executable code. Many techniques have been developed for software protection, none of which have provable security and are often circumvented relatively easily by a malicious party. Provably secure software protection is achievable via cryptographic methods, somet...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005