• DocumentCode
    2371610
  • Title

    Forensic analysis for tamper resistant software

  • Author

    Jin, Hongxia ; Lotspiech, Jeffery

  • Author_Institution
    Div. of Comput. Sci., IBM Almaden Res. Center, San Jose, CA, USA
  • fYear
    2003
  • fDate
    17-20 Nov. 2003
  • Firstpage
    133
  • Lastpage
    142
  • Abstract
    This paper concerns the protection of a software program and/or the content that the program protects. Software piracy and digital media piracy have cost industries billions of dollars each year. The success of the content/software security technologies in a large part depends on the capability of protecting software code against tampering and detecting the attackers who distribute the pirate copies. In this paper, we focus on the attacker detection and forensic analysis. We shall talk about a proactive detection scheme for defeating an on-going attack before the compromise has occurred. We shall also briefly explain another detection scheme for post-compromise attacker identification. In particular, we consider real world scenarios where the application programs connect with their vendors periodically, and where a detection of attacking can bar a hacker user from further business.
  • Keywords
    computer crime; copy protection; copyright; data privacy; software engineering; attacker identification; content protection; digital media piracy; forensic analysis; hacker; proactive detection; software code protection; software piracy; software program protection; software security; tamper resistant software; tampering; Application software; Computer crime; Computer hacking; Computer industry; Costs; Forensics; Motion pictures; Protection; Reverse engineering; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Reliability Engineering, 2003. ISSRE 2003. 14th International Symposium on
  • ISSN
    1071-9458
  • Print_ISBN
    0-7695-2007-3
  • Type

    conf

  • DOI
    10.1109/ISSRE.2003.1251037
  • Filename
    1251037