Software integrity checking expressions (ICEs) for robust tamper detection

被引:0
|
作者
Jakubowski, Mariusz
Naldurg, Prasad
Patankar, Vijay
Venkatesan, Ramarathnarn
机构
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce software integrity checking expressions (Soft-ICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail with some probability for any invalid execution (e.g., when the output value of one of the variables is tampered). PVCs work with straight-line integer programs that have {*, +, -} operations We also sketch how we can extend this class to include branches and loops. FLAs can work over programs with arbitrary operations, but have some limitations in terms of efficiency, code size, and ability to handle various classes of functions. We describe a few applications of this technique, such as program integrity checking, program or client identification, and tamper detection. As a generalization of oblivious hashing (OH), our approach resolves several A troublesome issues that complicate practical application of OH towards tamper-resistance.
引用
收藏
页码:96 / 111
页数:16
相关论文
共 50 条
  • [31] Software Defect Detection by Combining Bounded Model Checking and Approximations of Functions
    Akhin, M. Kh.
    Belyaev, M. A.
    Itsykson, V. M.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2014, 48 (07) : 389 - 397
  • [32] Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC
    Priyadarshini, Priyanka
    Naik, Kshiramani
    International Journal of Computers and Applications, 2024, 46 (08) : 580 - 603
  • [33] Model-Checking for Software Vulnerabilities Detection With Multi-Language Support
    Hadjidj, Rachid
    Yang, Xiaochun
    Tlili, Syrine
    Debbabi, Mourad
    SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 133 - 142
  • [34] A Software Reconfigurable Assertion Checking Unit for Run-Time Error Detection
    Zhou, Yumin
    Burg, Sebastian
    Bringmann, Oliver
    Rosenstiel, Wolfgang
    2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2018,
  • [35] A Systematic Differential Analysis for Fast and Robust Detection of Software Aging
    Matias, Rivalino, Jr.
    Andrzejak, Artur
    Machida, Fumio
    Elias, Diego
    Trivedi, Kishor
    2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 311 - 320
  • [36] An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios
    Xu, Fujiu
    Li, Jianqiang
    Xu, Xi
    MATHEMATICS, 2025, 13 (04)
  • [37] An efficient control-flow checking technique for the detection of soft-errors in embedded software
    Boroomandnezhad, Tahereh
    Azgomi, Mohammad Abdollahi
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (04) : 1320 - 1332
  • [38] Robust and Rapid Adaption for Concept Drift in Software System Anomaly Detection
    Ma, Minghua
    Zhang, Shenglin
    Pei, Dan
    Huang, Xin
    Dai, Hongwei
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2018, : 13 - 24
  • [39] Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection
    Arevalo-Ancona, Rodrigo Eduardo
    Cedillo-Hernandez, Manuel
    EGYPTIAN INFORMATICS JOURNAL, 2025, 30
  • [40] Robust facial landmark detection and tracking across poses and expressions for in-the-wild monocular video
    Liu S.
    Zhang Y.
    Yang X.
    Shi D.
    Zhang J.J.
    Zhang, Yongqiang (seekever@foxmail.com), 2017, Tsinghua University Press (03): : 33 - 47