Sciweavers

IWSEC
2009
Springer

Tamper-Tolerant Software: Modeling and Implementation

14 years 6 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produce a crash or gradual failure, rendering the application unusable or troublesome. Such a response is designed to complicate attacks, but has also caused problems for developers and end users, particularly when bugs or other problems invoke anti-tampering measures accidentally. To address these issues, an alternative approach is to detect and fix malicious changes. This paper presents a scheme to transform programs into tamper-tolerant versions that use self-correcting operation as a response against attacks. Combining techniques from the fields of fault tolerance and software security, the approach transforms programs via code individualization and redundancy. We also describe security enhancements through error correction, delayed responses and checkpointing. For security analysis, we adapt a graph-based m...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V
Added 27 May 2010
Updated 27 May 2010
Type Conference
Year 2009
Where IWSEC
Authors Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan
Comments (0)