An approach to the objective and quantitative evaluation of tamper-resistant software

被引:0
|
作者
Goto, H [1 ]
Mambo, M [1 ]
Matsumura, K [1 ]
Shizuya, H [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808476, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tamper-resistant software has been studied as techniques to protect algorithm or secret data. There are many ways to realize tamper-resistant software including the method of making software hard to read. So far, no objective and quantitative method is known for evaluating tamper-resistant software. Most of known evaluation methods require involvement of human being. That means their evaluation results deeply depend on the skill and subjectivity of human. Therefore, it has been expected to devise an objective and quantitative evaluation method in place of subjective evaluation methods. In this paper we propose a now such method to measure how hard to read. The basic idea is to use the parse tree of a compiler for a programming language, and evaluate depth and weights of the tree for a code. We give some experimental results to examine its effectiveness.
引用
收藏
页码:82 / 96
页数:15
相关论文
共 50 条
  • [1] Two-stage tamper response in tamper-resistant software
    Park, Moon Chan
    Koo, Woo Kwon
    Suh, Dong Geun
    Kim, In Seok
    Lee, Dong Hoon
    [J]. IET SOFTWARE, 2016, 10 (03) : 81 - 88
  • [2] Specifying and verifying hardware for tamper-resistant software
    Lie, D
    Mitchell, J
    Thekkath, CA
    Horowitz, M
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 166 - 177
  • [3] Delayed and controlled failures in tamper-resistant software
    Tan, Gang
    Chen, Yuqun
    Jakubowski, Mariusz H.
    [J]. INFORMATION HIDING, 2007, 4437 : 216 - +
  • [4] Evaluation of tamper-resistant software deviating from structured programming rules
    Goto, H
    Mambo, M
    Shizuya, H
    Watanabe, Y
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 145 - 158
  • [6] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [7] Tamper-resistant software system based on a finite state machine
    Monden, A
    Monsifrot, A
    Thomborson, C
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 112 - 122
  • [8] Tamper-resistant biometric IDs
    Kirovski, D
    Jojic, N
    Jancke, G
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
  • [9] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [10] Tamper-Resistant LikeJacking Protection
    Johns, Martin
    Lekies, Sebastian
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285