期刊文献+

基于白盒CLEFIA实现的软件防篡改方案

Software Tamper Resistance Scheme Based on White-Box CLEFIA Implementation
下载PDF
导出
摘要 2002年,CHOW等人根据数字版权管理(Digital Rights Management,DRM)应用场景定义了白盒攻击环境的概念,并将其模型化为一种极端的攻击模型,即白盒模型。白盒模型颠覆了以往攻击模型中对攻击者能力的诸多限制,从软件保护角度考虑,攻击者被认为拥有对目标软件及其执行的完全控制权。因此,在白盒模型中,数字版权管理系统中的设备,如智能卡、机顶盒等都存在被攻击者篡改的可能。文章基于CLEFIA算法的白盒实现方案,为数字版权管理系统提供一种软件防篡改方案。该方案将软件的二进制代码文件所解释的查找表隐藏在CLEFIA算法的白盒实现方案的查找表集合中,使软件的防篡改安全性与CLEFIA算法的白盒实现方案的加解密正确性结合在一起。一旦软件发生篡改,CLEFIA算法的白盒实现方案的加解密结果将产生错误。CLEFIA算法白盒实现方案的明密文对也将发生变化,而攻击者很难对其进行修复。 In 2002,Chow et al.defined the concept of white-box attack context according to the application scenario of digital rights management(DRM),and modeled it as an extreme attack model,namely white-box model.The white-box model subverts many restrictions on the ability of the attacker in the previous attack model.From the point of view of software protection,the attacker is considered to have complete control over the target software and its execution.Therefore,in the white-box model,devices in digital rights management systems,such as smart cards and set-top boxes,may be tampered with by attackers.Based on the white-box implementation scheme of CLEFIA algorithm,this paper proposed a software tamper-resistance scheme for digital rights management system.This scheme hided the lookup table interpreted by the binary code file of the software in the lookup table set of the white-box implementation scheme of the CLEFIA algorithm,so that the tamper-resistance security of the software was combined with the encryption and decryption correctness of the white-box implementation scheme of the CLEFIA algorithm.If the software suffers tampering,an error will occur in the encryption and decryption result of the white-box implementation of CLEFIA algorithm.In addition,it is difficult for the attacker to repair the correctness of the encryption and decryption of the white-box implementation of the CLEFIA algorithm.
作者 罗一诺 姚思 陈杰 董晓丽 LUO Yinuo;YAO Si;CHEN Jie;DONG Xiaoli(School of Telecommunications Engineering,Xidian University,Xi’an 710071,China;Henan Key Laboratory of Network Cryptography Technology,Zhengzhou 100190,China;School of Cyberspace Security,Xi’an University of Posts and Telecommunications,Xi’an 710121,China)
出处 《信息网络安全》 CSCD 北大核心 2023年第6期66-73,共8页 Netinfo Security
基金 “十三五”国家密码发展基金[MMJJ20180219] 陕西省自然科学基础研究计划基金[2021JM-126] 河南省网络密码技术重点实验室研究课题[LNCT2022-A08] 陕西省重点研发计划[2023-YBGY-015]。
关键词 软件防篡改 白盒攻击环境 白盒实现 查找表 CLEFIA算法 software tamper resistance white-box attack context white-box implementation lookup table CLEFIA algorithm
  • 相关文献

参考文献3

二级参考文献53

  • 1Hoi C, Atallah J M. Protecting software code by guards [G]//LNCS 2320: Proc of DRM Workshop. Berlin: Springer, 2001: 125-141.
  • 2Business Software Alliance. Fifth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2008. [2010-01-16]. http:// portal. bsa. org/ideglobalstudy2007/studies/2007_global_piracy_ study. pdf.
  • 3Business Software Alliance. Sixth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2009. [2010-01-16]. http:// portal. bsa. org/globalpiracy2008/studies/globalpiracy2008. pdf.
  • 4David L, Thekkath C, Mitchell M, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Systems, New York: ACM, 2000: 168-177.
  • 5Aucsmith D. Tamper Resistant Software : An implementation [G]//LNCS 1174: Proc of the 1st Int Workshop on Information Hiding. Berlin: Springer, 1996: 317-333.
  • 6Bryant E D, Atallah M J, Stytz M R. A Survey of Anti-tamper Technologies [J]. CrossTalk: The Journal of Defense Software Engineering, 2004, 17(11): 12-16.
  • 7Gleb N, Nasir M. Preventing piracy, reverse engineering, and tampering[J]. IEEE Computer, 2003, 36(7): 64-71.
  • 8Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection [J]. IEEE Trans on Software Engineering, 2002, 28(8) : 735-746.
  • 9Giffin J T, Christodoreseu M, Kruger L. Strengthening software self-checksumming via self-modifying code [C] // Proc of the 21st ACSAC. Washington, DC: IEEE Computer Society, 2005:23-32.
  • 10Wurster G, Oorschot P C, Somayaji A, et al. A generic attack on checksumming-based software tamper resistance [C]//Proc of IEEE Syrup on S&P. Washington, DC.. IEEE Computer Society, 2005: 127-138.

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部