Automated Software Protection through Program Externalization on Memory-Limited Secure Devices

S. Chaumette, Olivier Ly, Renaud Tabary
{"title":"Automated Software Protection through Program Externalization on Memory-Limited Secure Devices","authors":"S. Chaumette, Olivier Ly, Renaud Tabary","doi":"10.1109/EUC.2010.122","DOIUrl":null,"url":null,"abstract":"In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({\\em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUC.2010.122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({\em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在内存有限的安全设备上通过程序外部化实现自动软件保护
在本文中,我们提出了一种硬件辅助软件保护方案,该方案依赖于使用资源有限的安全令牌(例如智能卡)。这种保护包括将要保护的应用程序的敏感代码块的执行外部化到令牌块,而不敏感的代码仍然在不受信任的计算机内执行。我们定义了一个通用流程:自动执行保护。我们的方法依赖于静态分析技术,该技术用于推断要与运行时外部化协议一起外部化的代码部分。我们已经为Java应用程序开发了一个实现该技术的软件环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Predictive Power Control for Mobile Wireless Networks with Time-Varying Delay Localization with a Mobile Beacon in Underwater Sensor Networks Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making An Application Framework for Loosely Coupled Networked Cyber-Physical Systems On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1