Surreptitious software: Models from biology and history

被引:18
作者
Collberg, Christian [1 ]
Nagra, Jasvir [2 ]
Wang, Fei-Yue [3 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
[2] Univ Trent, Dipartimento Informat Telecommun, I-38050 Trento, Italy
[3] Chinese Acad Sci, Inst Automat, Key Lab Complex Syst Int Sci, Beijing, Peoples R China
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
software protection; defense mechanisms; taxonomy;
D O I
10.1007/978-3-540-73986-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamper-proofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.
引用
收藏
页码:1 / +
页数:3
相关论文
共 25 条
[1]  
AUCSMITH D, 1996, LNCS, V1174, P317, DOI DOI 10.1007/3-540-61996-8
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]  
CHANG H, 2002, LNCS, V2320
[4]  
COLLBERG C, 1998, ICCL 98
[5]  
COLLBERG C, 2004, WORKSH INF HID, P192
[6]  
COLLBERG C, 2004, ACM SIGPLAN C PROGR
[7]  
Collberg C., 1998, POPL 98
[8]  
CRONIN G, 2001, DEFENSE MECHANISMS, P314
[9]  
CUNNINGHAM W, 1987, OOPSLA 87
[10]  
FARRELL N, 2007, INQUIRER 0227