2020
DOI: 10.1145/3404891
|View full text |Cite
|
Sign up to set email alerts
|

Code Renewability for Native Software Protection

Abstract: Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This paper presents an architecture and supporting tool flow to renew parts of native applications dynamically. Renewed and diversified code and data belonging to either the original application or to linked-in protections are delivered from a secure server to a client on demand. This results in frequent changes to the software components when they are under attack, thus ma… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…This is particularly the case when irregular communication patterns can be linked to unauthorized activities such as running multiple copies in parallel or executing program fragments in a debugger in orders or frequencies not consistent with authorized uses. Such patterns can occur from communications present in the original applications, or from online SPs such as code renewability [2] and client-server code splitting [19]. Importantly, the use of non-monitoring communication does not require the implementation of reaction mechanisms in the protected application to be effective.…”
Section: Risk Monitoring Of the Released Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…This is particularly the case when irregular communication patterns can be linked to unauthorized activities such as running multiple copies in parallel or executing program fragments in a debugger in orders or frequencies not consistent with authorized uses. Such patterns can occur from communications present in the original applications, or from online SPs such as code renewability [2] and client-server code splitting [19]. Importantly, the use of non-monitoring communication does not require the implementation of reaction mechanisms in the protected application to be effective.…”
Section: Risk Monitoring Of the Released Applicationmentioning
confidence: 99%
“…It is based on a survey among the developers of all protections integrated in the ASPIRE project [6], whom we asked to score the impact of their protections on a range of attack activities in terms of concrete, clearly differentiated forms of impacts. These include impact on human comprehension difficulty by increasing code complexity, impact by moving relevant code fragments from the client-side software to a secure server not under control of an attacker [2,16,73], impact on difficulty of tampering through anti-tampering techniques with different reaction mechanisms and present monitoring capabilities [73], and impact of preventive protections such as anti-debugging [1,3]. The survey results were complemented with security expert feedback, and validated in pen test experiments with professional and amateur pen testers [20,21].…”
Section: Risk Mitigationmentioning
confidence: 99%