DocumentCode
2371610
Title
Forensic analysis for tamper resistant software
Author
Jin, Hongxia ; Lotspiech, Jeffery
Author_Institution
Div. of Comput. Sci., IBM Almaden Res. Center, San Jose, CA, USA
fYear
2003
fDate
17-20 Nov. 2003
Firstpage
133
Lastpage
142
Abstract
This paper concerns the protection of a software program and/or the content that the program protects. Software piracy and digital media piracy have cost industries billions of dollars each year. The success of the content/software security technologies in a large part depends on the capability of protecting software code against tampering and detecting the attackers who distribute the pirate copies. In this paper, we focus on the attacker detection and forensic analysis. We shall talk about a proactive detection scheme for defeating an on-going attack before the compromise has occurred. We shall also briefly explain another detection scheme for post-compromise attacker identification. In particular, we consider real world scenarios where the application programs connect with their vendors periodically, and where a detection of attacking can bar a hacker user from further business.
Keywords
computer crime; copy protection; copyright; data privacy; software engineering; attacker identification; content protection; digital media piracy; forensic analysis; hacker; proactive detection; software code protection; software piracy; software program protection; software security; tamper resistant software; tampering; Application software; Computer crime; Computer hacking; Computer industry; Costs; Forensics; Motion pictures; Protection; Reverse engineering; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Reliability Engineering, 2003. ISSRE 2003. 14th International Symposium on
ISSN
1071-9458
Print_ISBN
0-7695-2007-3
Type
conf
DOI
10.1109/ISSRE.2003.1251037
Filename
1251037
Link To Document