loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Chit W. (Nick) Saw ; Mariusz M. Jakubowski and Ramarathnam Venkatesan

Affiliation: Microsoft Research, United States

Keyword(s): Software protection, Tamper-resistance, Obfuscation, Security metrics.

Related Ontology Subjects/Areas/Topics: Enterprise Information Systems ; Formal Methods ; Information and Systems Security ; Information Systems Analysis and Specification ; Methodologies and Technologies ; Operational Research ; Secure Software Development Methodologies ; Security ; Security Engineering ; Security in Information Systems ; Security Metrics and Measurement ; Security Verification and Validation ; Simulation and Modeling

Abstract: This paper describes a new framework for design, implementation and evaluation of software-protection schemes. Our approach is based on the paradigm of iterated protection, which repeats and combines simple transformations to build up complexity and security. Based on ideas from the field of complex systems, iterated protection is intended as an element of a comprehensive obfuscation and tamper-resistance system, but not as a full-fledged, standalone solution. Our techniques can (and should) be combined with previously proposed approaches, strengthening overall protection. A long-term goal of this work is to create protection methods amenable to analysis or estimation of security in practice. As a step towards this, we present security evaluation via metrics computed over transformed code. Indicating the difficulty of real-life reverse engineering and tampering, such metrics offer one approach to move away from ad hoc, poorly analyzable approaches to protection.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.26.35.111

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
W. (Nick) Saw, C.; M. Jakubowski, M. and Venkatesan, R. (2009). ITERATED TRANSFORMATIONS AND QUANTITATIVE METRICS FOR SOFTWARE PROTECTION. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 359-368. DOI: 10.5220/0002220103590368

@conference{secrypt09,
author={Chit {W. (Nick) Saw}. and Mariusz {M. Jakubowski}. and Ramarathnam Venkatesan.},
title={ITERATED TRANSFORMATIONS AND QUANTITATIVE METRICS FOR SOFTWARE PROTECTION},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={359-368},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002220103590368},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - ITERATED TRANSFORMATIONS AND QUANTITATIVE METRICS FOR SOFTWARE PROTECTION
SN - 978-989-674-005-4
IS - 2184-3236
AU - W. (Nick) Saw, C.
AU - M. Jakubowski, M.
AU - Venkatesan, R.
PY - 2009
SP - 359
EP - 368
DO - 10.5220/0002220103590368
PB - SciTePress