Presentation 2016-09-02
Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessarily run. In order to realize it, primitive techniques and construction method are proposed. The proposed method utilizes data memory, and tamper resistant software created by the proposed method generates self-destructive tamper response based on indirect jump and Return-Oriented Programming.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) tamper resistant software / self-modifying / self-destructive / indirect jump / ROP (Return-Oriented Programming)
Paper # ISEC2016-45
Date of Issue 2016-08-26 (ISEC)

Conference Information
Committee ISEC
Conference Date 2016/9/2(1days)
Place (in Japanese) (See Japanese page)
Place (in English) Kikai-Shinko-Kaikan Bldg.
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Masahiro Mambo(Kanazawa Univ.)
Vice Chair Kazuto Ogawa(NHK) / Atsushi Fujioka(Kanagawa Univ.)
Secretary Kazuto Ogawa(Toshiba) / Atsushi Fujioka(Tohoku Univ.)
Assistant Toshihiro Ohigashi(Tokai Univ.) / Yuuji Suga(IIJ) / Atsuo Inomata(Tokyo Denki Univ.)

Paper Information
Registration To Technical Committee on Information Security
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Tamper Resistant Software utilizing Data Memory
Sub Title (in English)
Keyword(1) tamper resistant software
Keyword(2) self-modifying
Keyword(3) self-destructive
Keyword(4) indirect jump
Keyword(5) ROP (Return-Oriented Programming)
1st Author's Name Kazuomi Oishi
1st Author's Affiliation Shizuoka Institute of Science and Technology(SIST)
Date 2016-09-02
Paper # ISEC2016-45
Volume (vol) vol.116
Number (no) ISEC-207
Page pp.pp.43-48(ISEC),
#Pages 6
Date of Issue 2016-08-26 (ISEC)