首页> 外文期刊>International journal of computer science and network security >CryptoNET: Software Protection and Secure Execution Environment
【24h】

CryptoNET: Software Protection and Secure Execution Environment

机译:CryptoNET:软件保护和安全执行环境

获取原文
获取原文并翻译 | 示例

摘要

The software modules are key component of information technology. Most of software owners and users are concerned about the protection of software modules against reverse engineering, illegal tempering, program-based attacks, BORE (Break Once Run Everywhere) attack and unauthorized use of software. Some efforts have been made to protect software modules using cryptographic techniques like digitally signed Java Applet which is verified by Java Virtual Machine (JVM) before execution.rnHowever today, software modules are not protected using strong encryption techniques and extended cryptographic functions, because existing execution environments do not support to process and execute protected software modules. Normally, such environment should act as a middleware platform between software modules and operating system. This paper describes protection of software modules which is based on strong encryption techniques, for example public key encryption and digital signature. These protected software modules are encapsulated in our designed XML file which describes a general syntax of protected software modules. In addition, our designed system also securely distributes software modules to authorized user. Secure software distribution system is based on well established standards and protocols like FIPS-196 based extended strong authentication protocol and SAML based authorization security policies. We also designed secure execution environment which is capable to execute signed and encrypted software modules, supports standard security services and network security protocols. These are: transparent handling of certificates, use of FIPS-201 compliant smart cards, single-sign-on protocol, strong authentication protocol, and secure asynchronous sessions.
机译:软件模块是信息技术的关键组件。大多数软件所有者和用户都担心软件模块受到逆向工程,非法回火,基于程序的攻击,BORE(无处不在的中断)攻击和未经授权使用软件的保护。已经进行了一些努力来使用数字签名的Java Applet等加密技术来保护软件模块,该软件在执行之前已通过Java虚拟机(JVM)进行了验证。然而,由于现有的执行方式,如今,软件模块还没有使用强大的加密技术和扩展的加密功能进行保护。环境不支持处理和执行受保护的软件模块。通常,这种环境应充当软件模块和操作系统之间的中间件平台。本文介绍了基于强大加密技术(例如公钥加密和数字签名)的软件模块保护。这些受保护的软件模块封装在我们设计的XML文件中,该文件描述了受保护的软件模块的一般语法。此外,我们设计的系统还可以安全地将软件模块分发给授权用户。安全的软件分发系统基于完善的标准和协议,例如基于FIPS-196的扩展强身份验证协议和基于SAML的授权安全策略。我们还设计了能够执行签名和加密的软件模块,支持标准安全服务和网络安全协议的安全执行环境。它们是:透明的证书处理,使用符合FIPS-201的智能卡,单点登录协议,强大的身份验证协议和安全的异步会话。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号