首页> 外文会议>ACM workshop on Digital rights management >Attacks and risk analysis for hardware supported software copy protection systems
【24h】

Attacks and risk analysis for hardware supported software copy protection systems

机译:硬件支持的软件复制保护系统的攻击和风险分析

获取原文

摘要

Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a specially tailored secure processor to prevent, 1) illegal software duplication, 2) unauthorized software modification, and 3)unauthorized software reverse engineering. The published techniques primarily focused on feasibility demonstration and design details rather than analyzing security risks and potential attacks from an adversary''s perspective. The uniqueness of software copy protection may lead to some potential attacks on such a secure environment that have been largely ignored or insufficiently addressed in the literature. One should not take security for granted just because it is implemented on a tamper-resistant secure processor. Detailed analysis on some proposed ideas reveal potential vulnerability and attacks. Some of the attacks are known to the security community, nevertheless, their implicationsto software copy protection are not well understood and discussed. This paper presents these cases for designers to improve their systems and circumvent the potential security pitfalls and for users of such systems to be aware of the potential risks>>> af++ DE102009024768A1 . 2010-12-23

机译:在智能卡生产过程中对操作系统或应用程序进行攻击的测试芯片卡的方法,包括模拟芯片卡上类似硬件的攻击,以使仿真芯片与攻击软件接合

  • 机译:为硬件接口和软件代码提供软音频和软调制解调器复制保护的系统和方法

  • 机译:为硬件接口和软件代码提供软音频和软调制解调器复制保护的系统和方法

  • 获取原文

    客服邮箱:kefu@zhangqiaokeyan.com

    京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
    • 客服微信

    • 服务号