An USB-Key_Based Approach for Software Tamper Resistance
A lot of approaches for software tamper resistance have been proposed to insure that the program will execute as expected. One important technique is integrity-checking which use self-hashing to check the integrity of the software, but the adversary can easily bypass the verification by locating the hash value comparison instruction. Another one is software encryption. But most of them don’t protect the keys and decryption routines well. In this paper we propose an approach for software tamper resistance based on USB-Key. We divide the software into individual blocks and use different keys to encrypt them, a number of small code segments called security guides which are used to control the program flow and check the security of software are inserted into the blocks. And the USB-Key is used to protect the keys and security self-checking.
software tamper resistance software protection USB-Key software encryption security guide
Shi-yuan Zheng Jun Liu
Department of Communication EngineeringThe PLA Science and Technology UniversityNanjing, China Department of Communication Engineering The PLA Science and Technology University Nanjing, China
国际会议
成都
英文
1-4
2010-08-20(万方平台首次上网日期,不代表论文的发表时间)