Program Protection through Software-based Hardware Abstraction

被引:2
|
作者
McDonald, J. Todd [1 ]
Manikyam, Ramya K. [1 ]
Bardin, Sebastien [2 ]
Bonichon, Richard [3 ]
Andel, Todd R. [1 ]
机构
[1] Univ S Alabama, Dept Comp Sci, Mobile, AL 36688 USA
[2] Univ Paris Saclay, LIST, CEA, Paris, France
[3] Nomadic Labs, Paris, France
基金
美国国家科学基金会;
关键词
Software Protection; MATE Attacks; Virtualization; Symbolic Analysis;
D O I
10.5220/0010557502470258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software companies typically embed one or more secrets in their programs to protect their intellectual property (IP) investment. These secrets are most often processed in code through evaluation of point functions, where only the correct password, PIN, or registration/activation code will authorize an end-user to legally install or use a product. Man-at-the-End (MATE) attacks can break assumptions of program security to find embedded secrets because they involve legitimate software owners who have complete access to the software and its execution environment. In this research, we present a novel approach to software MATE protection that leverages gate-level hardware representation, namely software-based hardware abstraction (SBHA). As a new proposed form of virtualization for software protection, SBHA demonstrates a light overhead - especially compared to much costlier traditional virtualization transformations, while completely defeating almost all symbolic execution-based attackers that were studied. Overall, SBHA bridges the gap between hardware and software protection, paving the way for future developments.
引用
收藏
页码:247 / 258
页数:12
相关论文
共 50 条
  • [31] The use of honeypot approach in software-based application protection for shareware programs
    Jap, C. H. Nick
    Blanchfield, P.
    Su, K. S. Daniel
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 127 - +
  • [32] Software-based copy protection for temporal media during dissemination and playback
    Grimen, Gisle
    Monch, Christian
    Midtstraum, Roger
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 362 - 377
  • [33] Implementation of Hardware-Based Expert Systems and Comparison of Their Performance to Software-Based Expert Systems
    Ritter, Noah
    Straub, Jeremy
    MACHINES, 2021, 9 (12)
  • [34] Coding Metasurface for Shaping Beams through Software-Based Approach
    Zhang, Q.
    Cui, T. J.
    2017 11TH INTERNATIONAL CONGRESS ON ENGINEERED MATERIALS PLATFORMS FOR NOVEL WAVE PHENOMENA (METAMATERIALS), 2017, : 394 - 396
  • [35] Configuring the deployment into software-based controllers through hierarchical simulations
    Barbieri, Giacomo
    Borsari, Roberto
    Fantuzzi, Cesare
    IFAC PAPERSONLINE, 2017, 50 (01): : 4330 - 4335
  • [36] SOFTWARE-BASED ASSESSMENT METHOD FOR STUDENT LEARNING OUTCOMES AND PROGRAM OUTCOMES
    Mehrubeoglu, Mehrube
    Verma, Satyajit
    2011 ASEE ANNUAL CONFERENCE & EXPOSITION, 2011,
  • [37] Hardware/software IP protection
    Dalpasso, M
    Bogliolo, A
    Benini, L
    37TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2000, 2000, : 593 - 596
  • [38] In vivo dynamic optical coherence tomography with hardware- and software-based motion correction
    Guo, Yu
    Morishita, Rion
    El-Sadek, Ibrahim Abd
    Mukherjee, Pradipta
    Zhu, Yiqiang
    Yasuno, Yoshiaki
    OPTICAL COHERENCE TOMOGRAPHY AND COHERENCE DOMAIN OPTICAL METHODS IN BIOMEDICINE XXVIII, 2024, 12830
  • [39] HARDWARE AND SOFTWARE FOR SYSTEM PROTECTION
    PARK, RH
    IEEE SPECTRUM, 1978, 15 (05) : 40 - 45
  • [40] Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing
    Narayan, Shravan
    Garfinkel, Tal
    Taram, Mohammadkazem
    Rudek, Joey
    Moghimi, Daniel
    Johnson, Evan
    Fallin, Chris
    Vahldiek-Oberwagner, Anjo
    LeMay, Michael
    Sahita, Ravi
    Tullsen, Dean
    Stefan, Deian
    IEEE MICRO, 2024, 44 (04) : 70 - 79