Software integrity checking expressions (ICEs) for robust tamper detection

被引:0
|
作者
Jakubowski, Mariusz
Naldurg, Prasad
Patankar, Vijay
Venkatesan, Ramarathnarn
机构
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce software integrity checking expressions (Soft-ICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail with some probability for any invalid execution (e.g., when the output value of one of the variables is tampered). PVCs work with straight-line integer programs that have {*, +, -} operations We also sketch how we can extend this class to include branches and loops. FLAs can work over programs with arbitrary operations, but have some limitations in terms of efficiency, code size, and ability to handle various classes of functions. We describe a few applications of this technique, such as program integrity checking, program or client identification, and tamper detection. As a generalization of oblivious hashing (OH), our approach resolves several A troublesome issues that complicate practical application of OH towards tamper-resistance.
引用
收藏
页码:96 / 111
页数:16
相关论文
共 50 条
  • [11] Multiple Watermarking On Digital Medical Images for Tamper Detection and Integrity Control
    Kurniawan, M. T.
    Adiwijaya
    Agung, Wiseto
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 145 - 148
  • [12] Distributed Application Tamper Detection Via Continuous Software Updates
    Collberg, Christian
    Martin, Sam
    Myers, Jonathan
    Nagra, Jasvir
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 319 - 328
  • [13] Robust watermarking scheme for tamper detection and authentication exploiting CA
    Pal, Pabitra
    Jana, Biswapati
    Bhaumik, Jaydeb
    IET IMAGE PROCESSING, 2019, 13 (12) : 2116 - 2129
  • [14] A robust video watermarking technique for the tamper detection of surveillance systems
    Arab, Farnaz
    Abdullah, Shahidan M.
    Hashim, Siti Zaiton Mohd
    Manaf, Azizah Abdul
    Zamani, Mazdak
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 10855 - 10885
  • [15] A robust framework for tamper detection in digital recorded voice signals
    Bernal-Patino, Adriana
    Ponomaryov, Volodymyr, I
    Reyes-Reyes, Rogelio
    Cruz-Ramos, Clara
    REAL-TIME IMAGE PROCESSING AND DEEP LEARNING 2019, 2019, 10996
  • [16] A robust video watermarking technique for the tamper detection of surveillance systems
    Farnaz Arab
    Shahidan M. Abdullah
    Siti Zaiton Mohd Hashim
    Azizah Abdul Manaf
    Mazdak Zamani
    Multimedia Tools and Applications, 2016, 75 : 10855 - 10885
  • [17] Accelerating Counterexample Detection in Software Model Checking
    Tian, Cong
    Duan, Zhao
    Duan, Zhenhua
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 250 - 251
  • [18] Robust Detection in the Presence of Integrity Attacks
    Mo, Yilin
    Hespanha, Joao
    Sinopoli, Bruno
    2012 AMERICAN CONTROL CONFERENCE (ACC), 2012, : 3541 - 3546
  • [19] Blind tamper detection in audio using chirp based robust watermarking
    Farooq, O.
    Datta, S.
    Blackledge, Jon
    WSEAS Transactions on Signal Processing, 2008, 4 (04): : 190 - 200
  • [20] Air Cargo Monitoring: A Robust Tamper Detection and Reliable Communication System
    Vijay, Rathinamala
    Singh, Harshpal
    Prabhakar, T. V.
    Hegde, Vinod
    Shigehalli, Pavan
    2018 IEEE 13TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES), 2018, : 34 - 37