首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Detecting Software Theft in Embedded Systems: A Side-Channel Approach
【24h】

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

机译:在嵌入式系统中检测软件盗窃:侧通道方法

获取原文
获取原文并翻译 | 示例

摘要

Source code plagiarism has become a serious problem for the industry. Although there exist many software solutions for comparing source codes, they are often not practical in the embedded environment. Today's microcontrollers have frequently implemented a memory read protection that prevents a verifier from reading out the necessary source code. In this paper, we present three verification methods to detect software plagiarism in embedded software without knowing the implemented source code. All three approaches make use of side-channel information that is obtained during the execution of the suspicious code. The first method is passive, i.e., no previous modification of the original code is required. It determines the Hamming weights of the executed instructions of the suspicious device and uses string matching algorithms for comparisons with a reference implementation. In contrast, the second method inserts additional code fragments as a watermark that can be identified in the power consumption of the executed source code. As a third method, we present how this watermark can be extended by using a signature that serves as a proof-of-ownership. We show that particularly the last two approaches are very robust against code-transformation attacks.
机译:源代码窃已成为业界的一个严重问题。尽管存在许多用于比较源代码的软件解决方案,但是它们通常在嵌入式环境中不切实际。当今的微控制器经常实现存储器读取保护,以防止验证程序读出必要的源代码。在本文中,我们提出了三种验证方法来检测嵌入式软件中的软件窃,而无需了解已实现的源代码。这三种方法都利用了在执行可疑代码期间获得的边信道信息。第一种方法是被动的,即不需要对原始代码进行先前的修改。它确定可疑设备已执行指令的汉明权重,并使用字符串匹配算法与参考实现进行比较。相反,第二种方法插入其他代码片段作为水印,可以在执行的源代码的功耗中将其识别出来。作为第三种方法,我们介绍了如何通过使用用作所有权证明的签名来扩展该水印。我们证明,特别是后两种方法对代码转换攻击非常健壮。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号