Forensic Analysis for Tamper Resistant Software

  • Authors:
  • Hongxia Jin;Jeffery Lotspiech

  • Affiliations:
  • -;-

  • Venue:
  • ISSRE '03 Proceedings of the 14th International Symposium on Software Reliability Engineering
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper concerns the protection of a software programand/or the content that the program protects. Softwarepiracy and digital media piracy have cost industries billionsof dollars each year. The success of the content/software securitytechnologies in a large part depends on the capabilityof protecting software code against tampering and detectingthe attackers who distribute the pirate copies. In this paper,we focus on the attacker detection and forensis analysis.We shall talk about a proactive detection scheme for defeatingan on-going attack before the compromise has occurred.We shall also briefly explain another detection scheme forpost-compromise attacker identification. In particular, weconsider real world scenarios where the application programsconnect with their vendors periodically, and wherea detection of attacking can bar a hacker user from furtherbusiness.