Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Two-stage tamper response in tamper-resistant software

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Moon Chan-
dc.contributor.authorKoo, Woo Kwon-
dc.contributor.authorSuh, Dong Geun-
dc.contributor.authorKim, In Seok-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-03T23:30:40Z-
dc.date.available2021-09-03T23:30:40Z-
dc.date.created2021-06-18-
dc.date.issued2016-06-
dc.identifier.issn1751-8806-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/88557-
dc.description.abstractMalicious modification of software continues to raise concerns; thus, many countermeasures against these threats have been proposed such as obfuscation and tamper resistance techniques that can be combined to create tamper-resistant software. The methods for responding to tampering are an important consideration in tamper-resistant software design. Many tamper response mechanisms deliberately cause the application to crash; however, this response has negative impacts on the developers and users. An alternative approach is to detect and fix malicious changes. However, this approach cannot deter an attacker from attempting to continuously modify target software. This study presents robust tamper-resistant software techniques to mitigate tampering and reverse engineering attacks. The tamper-resistant software is based on an existing control flow flattening scheme and includes extensions for tamper detection and flexibility. Furthermore, the authors introduce a dynamic key in their two-stage tamper response scheme that considers both software stability and continuous attack. When tampering is detected, the proposed two-stage tamper response first produces a warning level response such as self-healing or programme termination. Next, if an attacker continuously attempts to bypass the warning level response, a self-destructive tamper response is triggered, as the result of an incorrectly computed dynamic key.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.subjectOBFUSCATION-
dc.subjectPROTECTION-
dc.subjectCODE-
dc.titleTwo-stage tamper response in tamper-resistant software-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, In Seok-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1049/iet-sen.2014.0231-
dc.identifier.scopusid2-s2.0-84973320537-
dc.identifier.wosid000378414100003-
dc.identifier.bibliographicCitationIET SOFTWARE, v.10, no.3, pp.81 - 88-
dc.relation.isPartOfIET SOFTWARE-
dc.citation.titleIET SOFTWARE-
dc.citation.volume10-
dc.citation.number3-
dc.citation.startPage81-
dc.citation.endPage88-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusOBFUSCATION-
dc.subject.keywordPlusPROTECTION-
dc.subject.keywordPlusCODE-
dc.subject.keywordAuthorreverse engineering-
dc.subject.keywordAuthorsafety-critical software-
dc.subject.keywordAuthorsoftware reliability-
dc.subject.keywordAuthorsoftware malicious modification-
dc.subject.keywordAuthortamper resistance techniques-
dc.subject.keywordAuthortamper-resistant software design-
dc.subject.keywordAuthorend users-
dc.subject.keywordAuthormalicious change detection-
dc.subject.keywordAuthormalicious change fixing-
dc.subject.keywordAuthorrobust tamper-resistant software techniques-
dc.subject.keywordAuthorreverse engineering attacks-
dc.subject.keywordAuthorcontrol flow flattening scheme-
dc.subject.keywordAuthortwo-stage tamper response scheme-
dc.subject.keywordAuthorwarning level response-
dc.subject.keywordAuthorprogramme termination-
dc.subject.keywordAuthorself-destructive tamper response-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE