Title :
Self-Checking Tamper-Proofing Based on Software Behavior Model
Author :
Li, Dan ; Hu, Yingsong ; Hu, Xiangxiao ; Ling, Hefei
Author_Institution :
Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Abstract :
With the consistent propulsion of the application software, the protection of software itself becomes a serious issue. A novel algorithm and an approach to behavior self-check for software tamper-proofing is proposed in this paper. To represent the principle of tamper-proofing, a behavior model is used to specify software behavior characteristic while the behavior fingerprint is computed by the secure Hash function. Combined with the program flow controlling and self-decryption technology, behavior self-checking technique can monitor instruction, capture behavior and calculate behavior fingerprint to ensure anti-attack capability of software. Analysis results show that the algorithm is capable of resisting static and dynamic attacks strongly.
Keywords :
computer crime; cryptography; antiattack capability; behavior fingerprint; program flow controlling; secure hash function; self-checking tamper-proofing; self-decryption technology; software behavior model; Algorithm design and analysis; Computer hacking; Computer science; Cryptography; Detectors; Embedded software; Fingerprint recognition; Protection; Security; Software testing; Behavior model; Self-Checking; Tamper-Proofing;
Conference_Titel :
Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3932-4
Electronic_ISBN :
978-1-4244-5467-9
DOI :
10.1109/FCST.2009.17