会议专题

An USB-Key_Based Approach for Software Tamper Resistance

A lot of approaches for software tamper resistance have been proposed to insure that the program will execute as expected. One important technique is integrity-checking which use self-hashing to check the integrity of the software, but the adversary can easily bypass the verification by locating the hash value comparison instruction. Another one is software encryption. But most of them don’t protect the keys and decryption routines well. In this paper we propose an approach for software tamper resistance based on USB-Key. We divide the software into individual blocks and use different keys to encrypt them, a number of small code segments called security guides which are used to control the program flow and check the security of software are inserted into the blocks. And the USB-Key is used to protect the keys and security self-checking.

software tamper resistance software protection USB-Key software encryption security guide

Shi-yuan Zheng Jun Liu

Department of Communication EngineeringThe PLA Science and Technology UniversityNanjing, China Department of Communication Engineering The PLA Science and Technology University Nanjing, China

国际会议

2010 3rd International Conference on Advanced Computer Theory and Engineering(2010年第三届先进计算机理论与工程国际会议 ICACTE 2010)

成都

英文

1-4

2010-08-20(万方平台首次上网日期,不代表论文的发表时间)