A Framework for Secure Execution of Software

TitleA Framework for Secure Execution of Software
Publication TypeJournal Article
Year of Publication2004
AuthorsA. Mana, J. Lopez, J. J. Ortega, E. Pimentel, and J. M. Troya
JournalInternational Journal of Information Security (IJIS)
Volume3
Number2
Pagination99-112
PublisherSpringer
ISSN Number1615-5262
Abstract

    The protection of software applications is one of the most important problems to solve in information security because it has a crucial effect on other security issues.We can find in the literature many research initiatives that have tried to solve this problem, many of them based on the use of tamperproof hardware tokens. This type of solutions depends on two basic premises: (i) to increase the physical security by using tamperproof devices, and (ii) to increase the complexity of the analysis of the software. The first premise is reasonable. The second one is certainly related to the first one. In fact, its main goal is that the pirate user can not modify the software to bypass an operation that is crucial: checking the presence of the token. However, the experience shows that the second premise is not realistic because the analysis of the executable code is always possible. Moreover, the techniques used to obstruct the analysis process are not enough to discourage an attacker with average resources. In this paper, we review the most relevant works related to software protection, present a taxonomy of those works and, most important, we introduce a new and robust software protection scheme. This solution, called SmartProt, is based on the use of smart cards and cryptographic techniques, and its security relies only on the first of previous premises; that is, Smartprot has been designed to avoid attacks based on code analysis and software modification. The entire system is described following a lifecycle approach, explaining in detail the card setup, production, authorization, and execution phases. We also present some interesting applications of Smart- Prot as well as the protocols developed to manage licenses. Finally, we provide an analysis of its implementation details.

Citation KeyAntonioMana2004
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/AntonioMana2004.pdf