Presentation on theme: "Dynamic Self-Checking Techniques for Improved Tamper Resistance Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan STAR Lab, InterTrust Technologies."— Presentation transcript:
Dynamic Self-Checking Techniques for Improved Tamper Resistance Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan STAR Lab, InterTrust Technologies
2/10 Introduction Self-checking (Self-validation or integrity checking) –While running, checks itself –Static Check its integrity only once, during start-up –Dynamic Repeatedly verifies its integrity as it is running Another protection techniques –Thwart reverse engineering Customization, obfuscation –Thwart debuggers and emulators Watermarking, fingerprinting
3/10 Related Work Obfuscation –To thwart reverse engineering Customization –Create many very different versions Software watermarking –Allow tracking of misused program copies Self-checking –Tamper-proofing, integrity checking, and anti-tampering technology
4/10 Design Objectives Goal –Eliminate single points of failure Functionality –Comprehensive and Timely Dynamic Detection –Separate, Flexible Response –Modular Components –Platform Independence –Insignificant Performance Degradation Goal is to have no more than a 5% impact on performance –Easy Integration –Suitable for a Large Codebase
5/10 Threat Model (1/2) Discovery –Static Inspection Stealthy and obfuscation –Use of Debuggers and Similar Software Tools Detects standard debuggers and responds appropriately –Detection of Reads into the Code Obfuscation –Generalization Customization –Collusion Corrector –Inspection of Installation Patches Corrector
6/10 Threat Model (2/2) Disablement –Modifying the Testers Redundant, overlapping coverage –Modifying the Response Mechanism Need more robust tamper-response mechanism –Modifying Correctors Multiple overlapping hash computations –Temporary Modifications Minimize this thread
Your consent to our cookies if you continue to use this website.