loading
Documents

Research.Publish.Connect.

Paper

Authors: Brandon Broadnax 1 ; Matthias Huber 2 ; Bernhard Löwe 3 ; Jörn Müller-Quade 1 and Patrik Scheidecker 2

Affiliations: 1 Karlsruhe Institute of Technology, Karlsruhe and Germany ; 2 FZI Research Center for Information Technology, Karlsruhe and Germany ; 3 Rohde & Schwarz GmbH & Co. KG, Cologne and Germany

ISBN: 978-989-758-319-3

Keyword(s): Software Protection, Kerckhoffs’s Principle, Tamper-Proof Hardware.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Information Assurance ; Intellectual Property Protection

Abstract: We propose the first software protection scheme obeying Kerckhoffs’s principle that is suited for practical implementation. Previous schemes have either been closed source or too inefficient to be considered practically viable. A key technique of our scheme is to partition the software in such a way that a hacker who knows a set of parts cannot learn additional ones. To achieve a partition with this property, our scheme exploits the domain knowledge that is necessary to create the software as well as the inherent complexity of the software’s code. If a software is sufficiently complex to admit such a partition then we can prove that there are no successful attack strategies on our scheme other than storing every line of code that has been executed.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.91.41.87

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Broadnax, B.; Huber, M.; Löwe, B.; Müller-Quade, J. and Scheidecker, P. (2018). Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 553-558. DOI: 10.5220/0006906107190724

@conference{secrypt18,
author={Brandon Broadnax. and Matthias Huber. and Bernhard Löwe. and Jörn Müller{-}Quade. and Patrik Scheidecker.},
title={Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={553-558},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006906107190724},
isbn={978-989-758-319-3},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
SN - 978-989-758-319-3
AU - Broadnax, B.
AU - Huber, M.
AU - Löwe, B.
AU - Müller-Quade, J.
AU - Scheidecker, P.
PY - 2018
SP - 553
EP - 558
DO - 10.5220/0006906107190724

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.