loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: J. Todd McDonald 1 ; Ramya K. Manikyam 1 ; Sébastien Bardin 2 ; Richard Bonichon 3 and Todd R. Andel 1

Affiliations: 1 Department of Computer Science, University of South Alabama, Mobile, AL, U.S.A. ; 2 Université Paris-Saclay, CEA, LIST, France ; 3 Nomadic Labs, France

Keyword(s): Software Protection, MATE Attacks, Virtualization, Symbolic Analysis.

Abstract: Software companies typically embed one or more secrets in their programs to protect their intellectual property (IP) investment. These secrets are most often processed in code through evaluation of point functions, where only the correct password, PIN, or registration/activation code will authorize an end-user to legally install or use a product. Man-at-the-End (MATE) attacks can break assumptions of program security to find embedded secrets because they involve legitimate software owners who have complete access to the software and its execution environment. In this research, we present a novel approach to software MATE protection that leverages gate-level hardware representation, namely software-based hardware abstraction (SBHA). As a new proposed form of virtualization for software protection, SBHA demonstrates a light overhead – especially compared to much costlier traditional virtualization transformations, while completely defeating almost all symbolic execution-based attackers that were studied. Overall, SBHA bridges the gap between hardware and software protection, paving the way for future developments. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.200.182.101

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
McDonald, J.; Manikyam, R.; Bardin, S.; Bonichon, R. and Andel, T. (2021). Program Protection through Software-based Hardware Abstraction. In Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-524-1; ISSN 2184-7711, SciTePress, pages 247-258. DOI: 10.5220/0010557502470258

@conference{secrypt21,
author={J. Todd McDonald. and Ramya K. Manikyam. and Sébastien Bardin. and Richard Bonichon. and Todd R. Andel.},
title={Program Protection through Software-based Hardware Abstraction},
booktitle={Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT},
year={2021},
pages={247-258},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010557502470258},
isbn={978-989-758-524-1},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT
TI - Program Protection through Software-based Hardware Abstraction
SN - 978-989-758-524-1
IS - 2184-7711
AU - McDonald, J.
AU - Manikyam, R.
AU - Bardin, S.
AU - Bonichon, R.
AU - Andel, T.
PY - 2021
SP - 247
EP - 258
DO - 10.5220/0010557502470258
PB - SciTePress