Title :
Forensic analysis for tamper resistant software
Author :
Jin, Hongxia ; Lotspiech, Jeffery
Author_Institution :
Div. of Comput. Sci., IBM Almaden Res. Center, San Jose, CA, USA
Abstract :
This paper concerns the protection of a software program and/or the content that the program protects. Software piracy and digital media piracy have cost industries billions of dollars each year. The success of the content/software security technologies in a large part depends on the capability of protecting software code against tampering and detecting the attackers who distribute the pirate copies. In this paper, we focus on the attacker detection and forensic analysis. We shall talk about a proactive detection scheme for defeating an on-going attack before the compromise has occurred. We shall also briefly explain another detection scheme for post-compromise attacker identification. In particular, we consider real world scenarios where the application programs connect with their vendors periodically, and where a detection of attacking can bar a hacker user from further business.
Keywords :
computer crime; copy protection; copyright; data privacy; software engineering; attacker identification; content protection; digital media piracy; forensic analysis; hacker; proactive detection; software code protection; software piracy; software program protection; software security; tamper resistant software; tampering; Application software; Computer crime; Computer hacking; Computer industry; Costs; Forensics; Motion pictures; Protection; Reverse engineering; Security;
Conference_Titel :
Software Reliability Engineering, 2003. ISSRE 2003. 14th International Symposium on
Print_ISBN :
0-7695-2007-3
DOI :
10.1109/ISSRE.2003.1251037