A Security Game Model for Remote Software Protection

被引:6
|
作者
Basilico, Nicola [1 ]
Lanzi, Andrea [1 ]
Monga, Mattia [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
D O I
10.1109/ARES.2016.96
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who could discover any secret information hidden in the code. Software protection by continuously updating the components deployed in an untrusted environment forces a malicious user to restart her or his analyses, thus reducing the time window in which the attack is feasible. In this setting, both the attacker and the defender need to know how to direct their (necessarily limited) efforts. In this paper, we analyze the problem from a game theoretical perspective in order to devise a rational strategy to decide when and which orthogonal updates have to be scheduled in order to minimize the security risks of tampering. We formalize the problem of protecting a set of software modules and we cast it as a game. Since the update strategy is observable by the attacker, we show that the Leader-Follower equilibrium is the proper solution concept for such a game and we describe the basic method to compute it.
引用
收藏
页码:437 / 443
页数:7
相关论文
共 50 条
  • [1] Protection Poker: The New Software Security "Game"
    Williams, Laurie
    Meneely, Andrew
    Shipley, Grant
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 14 - 20
  • [2] A graph game model for software tamper protection
    Dedic, Nenad
    Jakubowski, Mariusz
    Venkatesan, Ramarathnam
    INFORMATION HIDING, 2007, 4567 : 80 - +
  • [3] Changing the Game of Software Security
    Vidas T.
    Larsen P.
    Okhravi H.
    Sadeghi A.-R.
    IEEE Security and Privacy, 2018, 16 (02): : 10 - 11
  • [4] A Security Game Model for Environment Protection in the Presence of an Alarm System
    Basilico, Nicola
    De Nittis, Giuseppe
    Gatti, Nicola
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 192 - 207
  • [5] Changing the Game of Software Security INTRODUCTION
    Vidas, Timothy
    Larsen, Per
    Okhravi, Hamed
    Sadeghi, Ahmad-Reza
    IEEE SECURITY & PRIVACY, 2018, 16 (02) : 10 - 11
  • [6] Security and Scalability of Remote Entrusting Protection
    Desnitsky, Vasily
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, 2010, 6258 : 298 - 306
  • [7] SECURITY SOFTWARE DOUBLES YOUR PROTECTION
    SYNDERS, J
    COMPUTER DECISIONS, 1983, 15 (09): : 46 - &
  • [8] Information Security Protection in Software Testing
    Wang, Yubin
    Yao, Jinyu
    Yu, Xiaoxue
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 449 - 452
  • [9] On repeated stackelberg security game with the cooperative human behavior model for wildlife protection
    Wang, Binru
    Zhang, Yuan
    Zhou, Zhi-Hua
    Zhong, Sheng
    APPLIED INTELLIGENCE, 2019, 49 (03) : 1002 - 1015
  • [10] On Repeated Stackelberg Security Game with the Cooperative Human Behavior Model for Wildlife Protection
    Wang, Binru
    Zhang, Yuan
    Zhong, Sheng
    AAMAS'17: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2017, : 1751 - 1753