摘要
为了解决软件响应和验证易受攻击的问题,对现有的防篡改方案进行研究,提出一种基于完整性验证的防篡改模型TPM(Tamper Proofing Model)。该方案将软件分为多个单元,采用多种加密方式加密软件,对程序的控制流进行完整性验证得到Hash值,通过隐藏在程序中的密钥生成函数,利用得到的哈希值、注册码和用户码来计算各个加密单元的解密密钥。理论分析和实验结果表明,该模型无需修改底层硬件,易于实现,开销小且算法安全性高。
To solve the problem that the software response and verification are vulnerable to attack, we studied the existing tamperproofingschemes and presented an integrity checking-based tamperproofing model. The scheme divides the software into several units and employsvarious encryption methods to encrypt software. By conducting integrity checking on the control flow of the program it gets the Hash value,then through the key generation function hidden in the program and by making use of the derived Hash value, register code and user ID itcalculates the decryption keys of each encryption unit. Theoretical analysis and experimental results demonstrated that the model does notneed to modify the underlying hardware, it is easy to implement with small overhead and strong algorithm security.
作者
马巧梅
胡沙沙
陈够喜
Ma Qiaomei;Hu Shasha;Chen Gouxi(School of Computer and Control Engineering, North University of China, Taiyuan 030051 , Shanxi, China)
出处
《计算机应用与软件》
CSCD
2016年第8期312-314,318,共4页
Computer Applications and Software
基金
山西省自然科学基金项目(20120110101)
关键词
防篡改
完整性验证
控制流
安全性
Tamperproofing
Integrity checking
Control flow
Security