Title :
A Java Program Tamper-Proofing Method
Author :
Zhang, Xuesong ; He, Fengling ; Zuo, Wanli
Author_Institution :
Coll. of Comput. Sci. & Technol., Jilin Univ. Changchun, Changchun, China
Abstract :
Illegal distribution and use of software is a big ad hoc problem in software industry today, especially on the growing market of Java software product. Tamper-proofing techniques will disable some or all of the program¿s functionality once they detect any unwanted modifications during run time. This paper presents the attempt to Java software tamper-proofing technology by dynamic monitoring. The Java method¿s control flow graph is described by regular expressions, which can be regarded as a language. Certain stack signature in these control flows is also computed. During program execution, the protected method¿s control flow and stack signature information is verified at runtime by a monitor thread which checking whether the execution trace is accepted by the language, and the signature belongs to the right method. Experimental result shows that this tamper-proofing method is especially suitable for non-computation dense Java applications.
Keywords :
Java; security of data; system monitoring; Java program tamper-proofing method; Java software product; control flow graph; software industry; stack signature information; Application software; Computer security; Distributed computing; Helium; Java; Monitoring; Peer to peer computing; Protection; Software tools; Yarn; Control flow; Regular Expression; Software Protection; Stack signature; Tamper-proofing;
Conference_Titel :
Security Technology, 2008. SECTECH '08. International Conference on
Conference_Location :
Hainan Island
Print_ISBN :
978-0-7695-3486-2
DOI :
10.1109/SecTech.2008.28