Title :
Towards a unified software attack model to assess software protections
Author :
Basile, Cataldo ; Ceccato, Mariano
Author_Institution :
Politec. di Torino, Turin, Italy
Abstract :
Attackers can tamper with programs to break usage conditions. Different software protection techniques have been proposed to limit the possibility of tampering. Some of them just limit the possibility to understand the (binary) code, others react more actively when a change attempt is detected. However, the validation of the software protection techniques has been always conducted without taking into consideration a unified process adopted by attackers to tamper with programs. In this paper we present an extension of the mini-cycle of change, initially proposed to model the process of changing program for maintenance, to describe the process faced by an attacker to defeat software protections. This paper also shows how this new model should support a developer when considering what are the most appropriate protections to deploy.
Keywords :
program verification; security of data; software maintenance; binary code; program maintenance; program tampering; software protection assessment; software protection techniques; software security; unified software attack model; usage conditions; Context; Games; Maintenance engineering; Security; Software; Software protection; Testing; Program comprehension; Software protection; Software security;
Conference_Titel :
Program Comprehension (ICPC), 2013 IEEE 21st International Conference on
Conference_Location :
San Francisco, CA
DOI :
10.1109/ICPC.2013.6613852