Virtual leashing: creating a computational foundation for software protection

  • Authors:
  • Ori Dvir;Maurice Herlihy;Nir N. Shavit

  • Affiliations:
  • Computer Science Department, Tel Aviv University, Ramat Aviv, Israel;Computer Science Department, Brown University, Providence, RI;Computer Science Department, Tel Aviv University, Ramat Aviv, Israel

  • Venue:
  • Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
  • Year:
  • 2006
  • One-Time Programs

    CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce Virtual Leashing, a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, and places them on a secure server. The secure server provides the missing functionality, but never the missing code. Reverse engineering the missing code, even with full tracing of the program's execution and its communication with the server, is computationally hard. Moreover, the server provides the missing functionality asynchronously: the application's performance is independent (within reason) of the secure server's speed. For example, the server might reside on a slow inexpensive chip or a remote Internet server. Leashing makes only modest demands on communication bandwidth, space, and computation.