A Security Game Model for Remote Software Protection

被引:6
|
作者
Basilico, Nicola [1 ]
Lanzi, Andrea [1 ]
Monga, Mattia [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
D O I
10.1109/ARES.2016.96
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who could discover any secret information hidden in the code. Software protection by continuously updating the components deployed in an untrusted environment forces a malicious user to restart her or his analyses, thus reducing the time window in which the attack is feasible. In this setting, both the attacker and the defender need to know how to direct their (necessarily limited) efforts. In this paper, we analyze the problem from a game theoretical perspective in order to devise a rational strategy to decide when and which orthogonal updates have to be scheduled in order to minimize the security risks of tampering. We formalize the problem of protecting a set of software modules and we cast it as a game. Since the update strategy is observable by the attacker, we show that the Leader-Follower equilibrium is the proper solution concept for such a game and we describe the basic method to compute it.
引用
收藏
页码:437 / 443
页数:7
相关论文
共 50 条
  • [41] The security requirements behavior model for trustworthy software
    Saleh, Kassem
    Habil, Maryam
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
  • [42] Research of Remote Backup Protection Functioning at the Software and Hardware Complex RTDS
    Isakov, R.
    Ferenets, A.
    2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
  • [43] Security Assurance Model of Software Development for Global Software Development Vendors
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Alzahrani, Musaad
    Ilyas, Muhammad
    IEEE ACCESS, 2022, 10 : 58458 - 58487
  • [44] A security protection mechanism on program runtime based on software and hardware cooperation
    Li, Ya-Wei
    Zhang, Long-Bing
    Zhang, Fu-Xin
    Wang, Jian
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 180 - 201
  • [45] Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
    Williams, Laurie
    Gegick, Michael
    Meneely, Andrew
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 122 - 134
  • [46] Cloud Licensing Model for .NET Software Protection
    Chen, Bo
    Zhang, Wei-wei
    Yu, Ling
    Jiang, Ping
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1069 - 1074
  • [47] A Stochastic Game Model with Imperfect Information in Cyber Security
    Shiva, Sajjan
    Roy, Sankardas
    Bedi, Harkeerat
    Dasgupta, Dipankar
    Wu, Qishi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 308 - 318
  • [48] Reflexive Game Model for Control the Teams of Software Developers
    Orlov, S. P.
    2015 XVIII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2015, : 66 - 69
  • [49] Software Model Checking Based on Game Semantics and CSP
    Dimovski, Aleksandar
    Lazic, Ranko
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 128 (06) : 105 - 125
  • [50] The Building of a Security Strategy Based on the Model of Game Management
    Toliupa, Serhii
    Babenko, Tetiana
    Trush, Alexander
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 57 - 60