Program Protection through Software-based Hardware Abstraction

被引:2
|
作者
McDonald, J. Todd [1 ]
Manikyam, Ramya K. [1 ]
Bardin, Sebastien [2 ]
Bonichon, Richard [3 ]
Andel, Todd R. [1 ]
机构
[1] Univ S Alabama, Dept Comp Sci, Mobile, AL 36688 USA
[2] Univ Paris Saclay, LIST, CEA, Paris, France
[3] Nomadic Labs, Paris, France
基金
美国国家科学基金会;
关键词
Software Protection; MATE Attacks; Virtualization; Symbolic Analysis;
D O I
10.5220/0010557502470258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software companies typically embed one or more secrets in their programs to protect their intellectual property (IP) investment. These secrets are most often processed in code through evaluation of point functions, where only the correct password, PIN, or registration/activation code will authorize an end-user to legally install or use a product. Man-at-the-End (MATE) attacks can break assumptions of program security to find embedded secrets because they involve legitimate software owners who have complete access to the software and its execution environment. In this research, we present a novel approach to software MATE protection that leverages gate-level hardware representation, namely software-based hardware abstraction (SBHA). As a new proposed form of virtualization for software protection, SBHA demonstrates a light overhead - especially compared to much costlier traditional virtualization transformations, while completely defeating almost all symbolic execution-based attackers that were studied. Overall, SBHA bridges the gap between hardware and software protection, paving the way for future developments.
引用
收藏
页码:247 / 258
页数:12
相关论文
共 50 条
  • [1] Hardware Acceleration of a Software-based VPN
    Turan, Furkan
    de Clercq, Ruan
    Maene, Pieter
    Reparaz, Oscar
    Verbauwhede, Ingrid
    2016 26TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2016,
  • [2] Protection of software-based survivability mechanisms
    Wang, CX
    Davidson, J
    Hill, J
    Knight, J
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 193 - 202
  • [3] Software-Based Protection Is Moving to the Mainstream
    Gu, Yuan Xiang
    Wyseur, Brecht
    Preneel, Bart
    IEEE SOFTWARE, 2011, 28 (02) : 56 - +
  • [4] A security protection mechanism on program runtime based on software and hardware cooperation
    Li, Ya-Wei
    Zhang, Long-Bing
    Zhang, Fu-Xin
    Wang, Jian
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 180 - 201
  • [5] Feasibility of Software-based Repair for Program Memories
    Skoncej, Patryk
    Muehlbauer, Felix
    Kubicek, Felix
    Schroeder, Lukas
    Schoelzel, Mario
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 199 - 202
  • [6] Enhanced Compiler Technology for Software-based Hardware Fault Detection
    Baroffio, Davide
    Reghenzani, Federico
    Fornaciari, William
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2024, 29 (05)
  • [7] A Flexible Software-Based Framework for Online Detection of Hardware Defects
    Constantinides, Kypros
    Mutlu, Onur
    Austin, Todd
    Bertacco, Valeria
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (08) : 1063 - 1079
  • [8] Hardware- and software-based collective communication on the Quadrics network
    Petrini, F
    Coll, S
    Frachtenberg, E
    Hoisie, A
    IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2001, : 24 - 35
  • [9] Harbor: Software-based memory protection for sensor nodes
    Kumar, Ram
    Kohler, Eddie
    Srivastava, Mani
    PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2007, : 340 - 349
  • [10] SOFTWARE-BASED PROGRAM-DEVELOPMENT FOR PROGRAMMABLE CONTROLLERS
    不详
    TOOLING & PRODUCTION, 1985, 50 (12): : 116 - 117