Towards Optimally Hiding Protected Assets in Software Applications

REGANO, LEONARDO;
2017-01-01

Abstract

Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets’ security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers’ job. This paper presents a novel approach that uses three main methods to hide the protected assets: protection fingerprint replication, enlargement, and shadowing. The best way to hide assets is determined with a Mixed Integer Linear Program, which is automatically built starting from the code structure, the protected assets, and a model that depicts the dependencies among protection and the fingerprints they generate. Additional constraints, such as overhead limits are also supported to ensure the usability of the protected applications. Our implementation, which uses off-the-shelf solvers, showed promising performance and scalability on large applications.
2017
Inglese
2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)
978-1-5386-0592-9
IEEE
374
385
12
2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)
Contributo
Esperti anonimi
July 25-29, 2017
Prague (CZ)
internazionale
scientifica
Software security
software protection
linear optimization
decision algorithms
expert systems
software protection fingerprint
no
4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno
Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
273
4
4.1 Contributo in Atti di convegno
none
info:eu-repo/semantics/conferencePaper
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Questionario e social

Condividi su:
Impostazioni cookie