A Security Game Model for Remote Software Protection

被引:6
|
作者
Basilico, Nicola [1 ]
Lanzi, Andrea [1 ]
Monga, Mattia [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
D O I
10.1109/ARES.2016.96
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who could discover any secret information hidden in the code. Software protection by continuously updating the components deployed in an untrusted environment forces a malicious user to restart her or his analyses, thus reducing the time window in which the attack is feasible. In this setting, both the attacker and the defender need to know how to direct their (necessarily limited) efforts. In this paper, we analyze the problem from a game theoretical perspective in order to devise a rational strategy to decide when and which orthogonal updates have to be scheduled in order to minimize the security risks of tampering. We formalize the problem of protecting a set of software modules and we cast it as a game. Since the update strategy is observable by the attacker, we show that the Leader-Follower equilibrium is the proper solution concept for such a game and we describe the basic method to compute it.
引用
收藏
页码:437 / 443
页数:7
相关论文
共 50 条
  • [21] An Overview of the Modern Methods of Security and Protection of Software Systems
    Letychevskyi, O. O.
    Peschanenko, V. S.
    Hryniuk, Y., V
    Radchenko, V. Yu
    Yakovlev, V. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2019, 55 (05) : 840 - 850
  • [22] Sequential game model of subway security inspection in terrorism related explosion protection based on white list
    Li D.
    Liu D.
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2021, 41 (11): : 2975 - 2991
  • [23] A Practical Model For Rating Software Security
    Xu, Haiyun
    Heijmans, Jeroen
    Visser, Joost
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 232 - 233
  • [24] A MODEL FOR SECURITY AND PROTECTION IN PERSISTENT SYSTEMS
    KEEDY, JL
    MICROPROCESSORS AND MICROSYSTEMS, 1993, 17 (03) : 139 - 146
  • [25] Eternal War in Software Security: A Survey of Control Flow Protection
    Tang, Bowen
    Ying, Huan
    Wang, Wei
    Tang, Huabin
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 716 - 725
  • [26] Analysis of Software Vulnerabilities, Measures for Prevention and Protection and Security Testing
    Nakov, Ognian
    Trifonov, Roumen
    Pavlova, Galya
    Nakov, Plamen
    2021 29TH NATIONAL CONFERENCE WITH INTERNATIONAL PARTICIPATION (TELECOM), 2021, : 73 - 76
  • [27] An empirical model of the game software development processes
    Lee, Seung Hun
    Lee, Gum Hee
    Cho, Hyun Hoon
    Song, Doo Heon
    Rhew, Sung Yul
    Fourth International Conference on Software Engineering Research, Management and Applications, Proceedings, 2006, : 371 - 377
  • [28] A generic intrusion detection game model in IT security
    Kantzavelou, Ioanna
    Katsikas, Sokratis
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 151 - +
  • [29] A Game-Based Learning Software Model
    Ali, Shamsa Abdulla Salem
    Al Darei, Nafla Saeed
    Belkhouche, Boumediene
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 350 - 355
  • [30] What are Security Patterns? A Formal Model for Security and Design of Software
    Behrens, Anika
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,