loading
Papers Papers/2020

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Brandon Broadnax 1 ; Matthias Huber 2 ; Bernhard Löwe 3 ; Jörn Müller-Quade 1 and Patrik Scheidecker 2

Affiliations: 1 Karlsruhe Institute of Technology, Karlsruhe and Germany ; 2 FZI Research Center for Information Technology, Karlsruhe and Germany ; 3 Rohde & Schwarz GmbH & Co. KG, Cologne and Germany

ISBN: 978-989-758-319-3

ISSN: 2184-2825

Keyword(s): Software Protection, Kerckhoffs’s Principle, Tamper-Proof Hardware.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Information Assurance ; Intellectual Property Protection

Abstract: We propose the first software protection scheme obeying Kerckhoffs’s principle that is suited for practical implementation. Previous schemes have either been closed source or too inefficient to be considered practically viable. A key technique of our scheme is to partition the software in such a way that a hacker who knows a set of parts cannot learn additional ones. To achieve a partition with this property, our scheme exploits the domain knowledge that is necessary to create the software as well as the inherent complexity of the software’s code. If a software is sufficiently complex to admit such a partition then we can prove that there are no successful attack strategies on our scheme other than storing every line of code that has been executed.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.210.184.142

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Broadnax, B.; Huber, M.; Löwe, B.; Müller-Quade, J. and Scheidecker, P. (2018). Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT, ISBN 978-989-758-319-3 ISSN 2184-2825, pages 553-558. DOI: 10.5220/0006906107190724

@conference{secrypt18,
author={Brandon Broadnax. and Matthias Huber. and Bernhard Löwe. and Jörn Müller{-}Quade. and Patrik Scheidecker.},
title={Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT,},
year={2018},
pages={553-558},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006906107190724},
isbn={978-989-758-319-3},
issn={2184-2825},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT,
TI - Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
SN - 978-989-758-319-3
IS - 2184-2825
AU - Broadnax, B.
AU - Huber, M.
AU - Löwe, B.
AU - Müller-Quade, J.
AU - Scheidecker, P.
PY - 2018
SP - 553
EP - 558
DO - 10.5220/0006906107190724

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.