Software integrity checking expressions (ICEs) for robust tamper detection

被引:0
|
作者
Jakubowski, Mariusz
Naldurg, Prasad
Patankar, Vijay
Venkatesan, Ramarathnarn
机构
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce software integrity checking expressions (Soft-ICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail with some probability for any invalid execution (e.g., when the output value of one of the variables is tampered). PVCs work with straight-line integer programs that have {*, +, -} operations We also sketch how we can extend this class to include branches and loops. FLAs can work over programs with arbitrary operations, but have some limitations in terms of efficiency, code size, and ability to handle various classes of functions. We describe a few applications of this technique, such as program integrity checking, program or client identification, and tamper detection. As a generalization of oblivious hashing (OH), our approach resolves several A troublesome issues that complicate practical application of OH towards tamper-resistance.
引用
收藏
页码:96 / 111
页数:16
相关论文
共 50 条
  • [41] Robust facial landmark detection and tracking across poses and expressions for in-the-wild monocular video
    Shuang Liu
    Yongqiang Zhang
    Xiaosong Yang
    Daming Shi
    Jian J.Zhang
    ComputationalVisualMedia, 2017, 3 (01) : 33 - 47
  • [42] Model checking-based Software-FMEA: Assessment of fault tolerance and error detection mechanisms
    Molnár V.
    Majzik I.
    Periodica polytechnica Electrical engineering and computer science, 2017, 61 (02): : 132 - 150
  • [43] Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection
    Ming, Jiang
    Zhang, Fangfang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (04) : 1647 - 1664
  • [45] Robust recurrent neural network modeling for software fault detection and correction prediction
    Hu, Q. P.
    Xie, M.
    Ng, S. H.
    Levitin, G.
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (03) : 332 - 340
  • [46] Plagiarism prevention or detection? The contribution of text-matching software to education about academic integrity
    Keuskamp, Dominic
    Sliuzas, Regina
    JOURNAL OF ACADEMIC LANGUAGE AND LEARNING, 2007, 1 (01): : A91 - A99
  • [47] ERROR-DETECTION IN SOFTWARE-IMPLEMENTED SELF-CHECKING TESTERS IN MICROPROCESSOR-BASED SYSTEMS
    SAPOZHNIKOV, VV
    SAPOZHNIKOV, VV
    KHARITONOV, AV
    CHUKHONIN, VM
    AUTOMATION AND REMOTE CONTROL, 1989, 50 (12) : 1718 - 1726
  • [48] Robust Boundary-Enhanced GMM-SMOTE Software Defect Detection Method
    Luo S.
    Su X.
    Pan L.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2021, 41 (03): : 303 - 310
  • [49] Robust KPI Anomaly Detection for Large-Scale Software Services with Partial Labels
    Zhang, Shenglin
    Zhao, Chenyu
    Sui, Yicheng
    Su, Ya
    Sun, Yongqian
    Zhang, Yuzhi
    Pei, Dan
    Wang, Yizhe
    2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 103 - 114
  • [50] Defending Against Voice Spoofing: A Robust Software-based Liveness Detection System
    Shang, Jiacheng
    Chen, Si
    Wu, Jie
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 28 - 36