Software integrity checking expressions (ICEs) for robust tamper detection

被引:0
|
作者
Jakubowski, Mariusz
Naldurg, Prasad
Patankar, Vijay
Venkatesan, Ramarathnarn
机构
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce software integrity checking expressions (Soft-ICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail with some probability for any invalid execution (e.g., when the output value of one of the variables is tampered). PVCs work with straight-line integer programs that have {*, +, -} operations We also sketch how we can extend this class to include branches and loops. FLAs can work over programs with arbitrary operations, but have some limitations in terms of efficiency, code size, and ability to handle various classes of functions. We describe a few applications of this technique, such as program integrity checking, program or client identification, and tamper detection. As a generalization of oblivious hashing (OH), our approach resolves several A troublesome issues that complicate practical application of OH towards tamper-resistance.
引用
收藏
页码:96 / 111
页数:16
相关论文
共 50 条
  • [1] Tamper resistant software by integrity-based encryption
    Lee, J
    Kim, H
    Yoon, H
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 608 - 612
  • [2] A Secure and Robust Approach to Software Tamper Resistance
    Ghosh, Sudeep
    Hiser, Jason D.
    Davidson, Jack W.
    INFORMATION HIDING, 2010, 6387 : 33 - 47
  • [3] A crisscross checking technique for tamper detection in halftone images
    Chen, J
    Chen, TS
    Pan, YM
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) : 287 - 295
  • [4] Radiomic Features for Medical Images Tamper Detection by Equivalence Checking
    Brunese, Luca
    Mercaldo, Francesco
    Reginelli, Alfonso
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 1795 - 1802
  • [5] Towards tamper detection and classification with robust watermarks
    Knowles, H
    Winne, D
    Canagarajah, N
    Bull, D
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II: COMMUNICATIONS-MULTIMEDIA SYSTEMS & APPLICATIONS, 2003, : 959 - 962
  • [6] Dynamic self-checking software watermark tamper-proofing method
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    Jilin Daxue Xuebao (Gongxueban), 2007, 5 (1148-1153): : 1148 - 1153
  • [7] Self-Checking Tamper-Proofing Based on Software Behavior Model
    Li, Dan
    Hu, Yingsong
    Hu, Xiangxiao
    Ling, Hefei
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 639 - 643
  • [8] A novel tamper detection watermarking approach for improving image integrity
    Muath AlShaikh
    Multimedia Tools and Applications, 2023, 82 : 10039 - 10060
  • [9] A novel tamper detection watermarking approach for improving image integrity
    AlShaikh, Muath
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (07) : 10039 - 10060
  • [10] A Novel Robust Watermarking Algorithm for Image Tamper Detection
    Afzali, Nashmin
    Manochehri, Kooroush
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (11): : 16 - 19