Tamper resistance for software protection

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 460
  • Download : 0
Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this thesis, We present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism makes use of multi-blocking encryption technique so that no hash value comparison is needed and if the program was altered, the program will not exit in a traceable way. We also make use of common virus techniques to enhance our security. Our mechanism operates on binaries that can be applied to all PE format files like EXE and DLL. The overhead in runtime execution and program size is reasonable as illustrated by real implementation.
Advisors
Kim, Kwnag-Joresearcher김광조researcher
Description
한국정보통신대학교 : 공학부,
Publisher
한국정보통신대학교
Issue Date
2005
Identifier
392505/225023 / 020034589
Language
eng
Description

학위논문(석사) - 한국정보통신대학교 : 공학부, 2005, [ v, 52 p. ]

URI
http://hdl.handle.net/10203/55355
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392505&flag=dissertation
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0