Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
Brandon Broadnax, Matthias Huber, Bernhard Löwe, Jörn Müller-Quade, Patrik Scheidecker
2018
Abstract
We propose the first software protection scheme obeying Kerckhoffs’s principle that is suited for practical implementation. Previous schemes have either been closed source or too inefficient to be considered practically viable. A key technique of our scheme is to partition the software in such a way that a hacker who knows a set of parts cannot learn additional ones. To achieve a partition with this property, our scheme exploits the domain knowledge that is necessary to create the software as well as the inherent complexity of the software’s code. If a software is sufficiently complex to admit such a partition then we can prove that there are no successful attack strategies on our scheme other than storing every line of code that has been executed.
DownloadPaper Citation
in Harvard Style
Broadnax B., Huber M., Löwe B. and Müller-Quade J. (2018). Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 553-558. DOI: 10.5220/0006906105530558
in Bibtex Style
@conference{secrypt18,
author={Brandon Broadnax and Matthias Huber and Bernhard Löwe and Jörn Müller-Quade},
title={Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={553-558},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006906105530558},
isbn={978-989-758-319-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
SN - 978-989-758-319-3
AU - Broadnax B.
AU - Huber M.
AU - Löwe B.
AU - Müller-Quade J.
PY - 2018
SP - 553
EP - 558
DO - 10.5220/0006906105530558