Presentation | 2015-03-04 An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi OISHI, Naoki YOSHIDA, Naoki WATANABE, Jun'ichi SAKAMOTO, Tsutomu MATSUMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Self destructive tamper resistant software (SDTRS) has strong resistance against attacker's analysis or modification because it generates a series of unpredictable abnormal self destructive behaviors such as error or termination when unauthorized analysis or modification are detected. It was reported recently that the creation method of SDTRS was experimentally implemented, the automatic creation was realized, and correct function of the created SDTRS was confirmed. In this manuscript, an improved experimental implementation and experimentation results are shown. Experimentation data on camouflaged instructions, protected areas, program sizes, and execution time with respect to the SDTRS created by the improved experimental implementation are shown and the quantitative analysis is discussed. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Self destructive / Tamper response / Selfmodifying / Self integrity verification / Camouflaged instructions |
Paper # | ICSS2014-99 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2015/2/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation |
Sub Title (in English) | |
Keyword(1) | Self destructive |
Keyword(2) | Tamper response |
Keyword(3) | Selfmodifying |
Keyword(4) | Self integrity verification |
Keyword(5) | Camouflaged instructions |
1st Author's Name | Kazuomi OISHI |
1st Author's Affiliation | Shizuoka Institute of Science and Technology, Department of Computer Science() |
2nd Author's Name | Naoki YOSHIDA |
2nd Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
3rd Author's Name | Naoki WATANABE |
3rd Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
4th Author's Name | Jun'ichi SAKAMOTO |
4th Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
5th Author's Name | Tsutomu MATSUMOTO |
5th Author's Affiliation | Graduate School of Environment and Information Sciences Yokohama National University |
Date | 2015-03-04 |
Paper # | ICSS2014-99 |
Volume (vol) | vol.114 |
Number (no) | 489 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |