期刊文献+

基于完整性验证的软件防篡改方案 被引量:3

SOFTWARE TAMPERPROOFING SCHEME BASED ON INTEGRITY CHECKING
下载PDF
导出
摘要 为了解决软件响应和验证易受攻击的问题,对现有的防篡改方案进行研究,提出一种基于完整性验证的防篡改模型TPM(Tamper Proofing Model)。该方案将软件分为多个单元,采用多种加密方式加密软件,对程序的控制流进行完整性验证得到Hash值,通过隐藏在程序中的密钥生成函数,利用得到的哈希值、注册码和用户码来计算各个加密单元的解密密钥。理论分析和实验结果表明,该模型无需修改底层硬件,易于实现,开销小且算法安全性高。 To solve the problem that the software response and verification are vulnerable to attack, we studied the existing tamperproofingschemes and presented an integrity checking-based tamperproofing model. The scheme divides the software into several units and employsvarious encryption methods to encrypt software. By conducting integrity checking on the control flow of the program it gets the Hash value,then through the key generation function hidden in the program and by making use of the derived Hash value, register code and user ID itcalculates the decryption keys of each encryption unit. Theoretical analysis and experimental results demonstrated that the model does notneed to modify the underlying hardware, it is easy to implement with small overhead and strong algorithm security.
作者 马巧梅 胡沙沙 陈够喜 Ma Qiaomei;Hu Shasha;Chen Gouxi(School of Computer and Control Engineering, North University of China, Taiyuan 030051 , Shanxi, China)
出处 《计算机应用与软件》 CSCD 2016年第8期312-314,318,共4页 Computer Applications and Software
基金 山西省自然科学基金项目(20120110101)
关键词 防篡改 完整性验证 控制流 安全性 Tamperproofing Integrity checking Control flow Security
  • 相关文献

参考文献10

二级参考文献129

共引文献45

同被引文献22

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部