A Security Game Model for Remote Software Protection

被引:6
|
作者
Basilico, Nicola [1 ]
Lanzi, Andrea [1 ]
Monga, Mattia [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
D O I
10.1109/ARES.2016.96
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who could discover any secret information hidden in the code. Software protection by continuously updating the components deployed in an untrusted environment forces a malicious user to restart her or his analyses, thus reducing the time window in which the attack is feasible. In this setting, both the attacker and the defender need to know how to direct their (necessarily limited) efforts. In this paper, we analyze the problem from a game theoretical perspective in order to devise a rational strategy to decide when and which orthogonal updates have to be scheduled in order to minimize the security risks of tampering. We formalize the problem of protecting a set of software modules and we cast it as a game. Since the update strategy is observable by the attacker, we show that the Leader-Follower equilibrium is the proper solution concept for such a game and we describe the basic method to compute it.
引用
收藏
页码:437 / 443
页数:7
相关论文
共 50 条
  • [31] Security enhancement for software defined network using game theoretical approach
    Anithaashri, T. P.
    Ravichandran, G.
    Baskaran, R.
    COMPUTER NETWORKS, 2019, 157 : 112 - 121
  • [32] A Game Theoretic Model for Network Virus Protection
    Khammassi, Iyed
    Elazouzi, Rachid
    Haddad, Majed
    Mabrouki, Issam
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2460 - 2465
  • [33] Game Analysis of Copyright Protection of Software Products under Network Condition
    Yin, Xiaobo
    Liu, Hong
    2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL II, PROCEEDINGS, 2009, : 650 - +
  • [34] Intelligent information security model for remote bank
    Zeng, Guangping
    Yang, Yang
    Tu, Xuyan
    Chen, Ming
    Beijing Keji Daxue Xuebao/Journal of University of Science and Technology Beijing, 2006, 28 (01): : 96 - 100
  • [35] Quantitative Software Security Risk Assessment Model
    Mkpong-Ruffin, Idongesit
    Umphress, David
    Hamilton, John
    Gilbert, Juan
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 31 - 33
  • [36] An Integrated Model for Software Security Testing Requirements
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Rao, Liping
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1891 - 1895
  • [37] Maturity Model of Information Security for Software Developers
    Silva, M. P.
    Barros, R. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (10) : 1994 - 1999
  • [38] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [39] An Analytical Security Model for Existing Software Systems
    Isazadeh, Ayaz
    Elgedawy, Islam
    Karimpour, Jaber
    Izadkhah, Habib
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 691 - 702
  • [40] A Preliminary Structure of Software Security Assurance Model
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    PROCEEDINGS 2018 ACM/IEEE 13TH INTERNATIONAL CONFERENCE ON GLOBAL SOFTWARE ENGINEERING ICGSE 2018, 2018, : 137 - 140