http://iet.metastore.ingenta.com
1887

Two-stage tamper response in tamper-resistant software

Two-stage tamper response in tamper-resistant software

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Software — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Malicious modification of software continues to raise concerns; thus, many countermeasures against these threats have been proposed such as obfuscation and tamper resistance techniques that can be combined to create tamper-resistant software. The methods for responding to tampering are an important consideration in tamper-resistant software design. Many tamper response mechanisms deliberately cause the application to crash; however, this response has negative impacts on the developers and users. An alternative approach is to detect and fix malicious changes. However, this approach cannot deter an attacker from attempting to continuously modify target software. This study presents robust tamper-resistant software techniques to mitigate tampering and reverse engineering attacks. The tamper-resistant software is based on an existing control flow flattening scheme and includes extensions for tamper detection and flexibility. Furthermore, the authors introduce a dynamic key in their two-stage tamper response scheme that considers both software stability and continuous attack. When tampering is detected, the proposed two-stage tamper response first produces a warning level response such as self-healing or programme termination. Next, if an attacker continuously attempts to bypass the warning level response, a self-destructive tamper response is triggered, as the result of an incorrectly computed dynamic key.

http://iet.metastore.ingenta.com/content/journals/10.1049/iet-sen.2014.0231
Loading

Related content

content/journals/10.1049/iet-sen.2014.0231
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address