Paper Abstract and Keywords |
Presentation |
2015-03-04 15:55
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
because it generates a series of unpredictable abnormal self
destructive behaviors such as error or termination when
unauthorized analysis or modification are detected.
It was reported recently that
the creation method of SDTRS was experimentally implemented,
the automatic creation was realized, and
correct function of the created SDTRS was confirmed.
In this manuscript, an improved experimental implementation and
experimentation results are shown.
Experimentation data on camouflaged instructions, protected areas,
program sizes, and execution time with respect to the SDTRS created
by the improved experimental implementation are shown and
the quantitative analysis is discussed. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Self destructive / Tamper response / Self modifying / Self integrity verification / Camouflaged instructions / / / |
Reference Info. |
IEICE Tech. Rep., vol. 114, no. 489, ICSS2014-99, pp. 217-222, March 2015. |
Paper # |
ICSS2014-99 |
Date of Issue |
2015-02-24 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2014-99 |
Conference Information |
Committee |
ICSS |
Conference Date |
2015-03-03 - 2015-03-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Meio Univiersity |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Communication Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2015-03-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation |
Sub Title (in English) |
|
Keyword(1) |
Self destructive |
Keyword(2) |
Tamper response |
Keyword(3) |
Self modifying |
Keyword(4) |
Self integrity verification |
Keyword(5) |
Camouflaged instructions |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kazuomi Oishi |
1st Author's Affiliation |
Shizuoka Institute of Science and Technology (SIST) |
2nd Author's Name |
Naoki Yoshida |
2nd Author's Affiliation |
Yokohama National University (YNU) |
3rd Author's Name |
Naoki Watanabe |
3rd Author's Affiliation |
Yokohama National University (YNU) |
4th Author's Name |
Jun'ichi Sakamoto |
4th Author's Affiliation |
Yokohama National University (YNU) |
5th Author's Name |
Tsutomu Matsumoto |
5th Author's Affiliation |
Yokohama National University (YNU) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-3 |
Date Time |
2015-03-04 15:55:00 |
Presentation Time |
25 minutes |
Registration for |
ICSS |
Paper # |
ICSS2014-99 |
Volume (vol) |
vol.114 |
Number (no) |
no.489 |
Page |
pp.217-222 |
#Pages |
6 |
Date of Issue |
2015-02-24 (ICSS) |
|