Skip to main content

2018 | OriginalPaper | Buchkapitel

Harden Tamper-Proofing to Combat MATE Attack

verfasst von : Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The malicious modification on software is a major threat on software copyright. As a common protection method, tamper-proofing can detect and respond the malicious modification. However, existing works consider less about the security of tamper-proofing itself. When launching MATE (Man-At-The-End) attacks based on reverse engineering to the software equipped with embedded tamper-proofing, adversary is enabled to obtain all privileges to the execution code and device configure, which lead tamper proofing being attacked. In this paper, we design a novel tamper-proofing scheme to ensure the code integrity. Different from previous works, our tamper-proofing technique has executed in an isolated zone, Intel SGX (Software Guard Extension) enclave instances, such that the MATE attacks cannot compromise the tamper-proofing functions. Moreover, our scheme performs considerably high execution efficiency since it only introduces the constant extra cost of time and space. We deploy our work on SPECint-2006 benchmark suit. The experimental results demonstrate our scheme is light-weight for computation and storage.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Akhunzada, A., et al.: Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48, 44–57 (2015)CrossRef Akhunzada, A., et al.: Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48, 44–57 (2015)CrossRef
3.
Zurück zum Zitat Collberg, C., Thomborson, C.: Software watermarking: models and dynamic embeddings. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 311–324. ACM (1999) Collberg, C., Thomborson, C.: Software watermarking: models and dynamic embeddings. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 311–324. ACM (1999)
4.
Zurück zum Zitat Nagra, J., Collberg, C.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education (2009) Nagra, J., Collberg, C.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education (2009)
5.
Zurück zum Zitat Arnautov, S., et al.: Scone: secure Linux containers with Intel SGX. In: USENIX Symposium on Operating Systems Design and Implementation, vol. 16, pp. 689–703. USENIX Association (2016) Arnautov, S., et al.: Scone: secure Linux containers with Intel SGX. In: USENIX Symposium on Operating Systems Design and Implementation, vol. 16, pp. 689–703. USENIX Association (2016)
6.
Zurück zum Zitat Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. 33(3), 1–26 (2014)CrossRef Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. 33(3), 1–26 (2014)CrossRef
7.
Zurück zum Zitat Tsai, C., Porter, D.E., Vij, M.: Graphene-SGX: a practical library OS for unmodified applications on SGX. In: 2017 USENIX Annual Technical Conference (USENIX ATC 2017), pp. 645–658. USENIX Association (2017) Tsai, C., Porter, D.E., Vij, M.: Graphene-SGX: a practical library OS for unmodified applications on SGX. In: 2017 USENIX Annual Technical Conference (USENIX ATC 2017), pp. 645–658. USENIX Association (2017)
10.
Zurück zum Zitat Chen, H.Y., Hou, T.W., Lin, C.L.: Tamper-proofing basis path by using oblivious hashing on Java. ACM Sigplan Not. 42(2), 9–16 (2007)CrossRef Chen, H.Y., Hou, T.W., Lin, C.L.: Tamper-proofing basis path by using oblivious hashing on Java. ACM Sigplan Not. 42(2), 9–16 (2007)CrossRef
11.
Zurück zum Zitat Jacob, M., Jakubowski, M.H., Venkatesan, R.: Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. In: Proceedings of the 9th workshop on Multimedia & security, pp. 129–140. ACM (2007) Jacob, M., Jakubowski, M.H., Venkatesan, R.: Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. In: Proceedings of the 9th workshop on Multimedia & security, pp. 129–140. ACM (2007)
13.
Zurück zum Zitat Chen, Z., Wang, Z., Jia, C.: Semantic-integrated software watermarking with tamper-proofing. Multimed. Tools Appl. 77(9), 11159–11178 (2018)CrossRef Chen, Z., Wang, Z., Jia, C.: Semantic-integrated software watermarking with tamper-proofing. Multimed. Tools Appl. 77(9), 11159–11178 (2018)CrossRef
15.
Zurück zum Zitat Sharif, M.I., Lanzi, A., Giffin, J.T., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: The Network and Distributed System Security Symposium. ISOC (2008) Sharif, M.I., Lanzi, A., Giffin, J.T., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: The Network and Distributed System Security Symposium. ISOC (2008)
16.
Zurück zum Zitat Ren, C., Chen, K., Liu, P.: Droidmarking: resilient software watermarking for impeding android application repackaging. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, pp. 635–646. ACM (2014) Ren, C., Chen, K., Liu, P.: Droidmarking: resilient software watermarking for impeding android application repackaging. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, pp. 635–646. ACM (2014)
18.
Zurück zum Zitat Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Archive 2016, 86 (2016) Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Archive 2016, 86 (2016)
19.
Zurück zum Zitat Tian, H., Zhang, Y., Xing, C., Yan, S.: SGXKernel: a library operating system optimized for Intel SGX. In: Computing Frontiers Conference, pp. 35–44. ACM (2017) Tian, H., Zhang, Y., Xing, C., Yan, S.: SGXKernel: a library operating system optimized for Intel SGX. In: Computing Frontiers Conference, pp. 35–44. ACM (2017)
20.
Zurück zum Zitat Wang, S.,Wang, W., Bao, Q.,Wang, P.,Wang, X.,Wu, D.: Binary code retrofitting and hardening using SGX. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 43–49. ACM (2017) Wang, S.,Wang, W., Bao, Q.,Wang, P.,Wang, X.,Wu, D.: Binary code retrofitting and hardening using SGX. In: Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, pp. 43–49. ACM (2017)
21.
Zurück zum Zitat Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: IEEE Symposium on Security and Privacy, pp. 38–54. IEEE (2015) Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: IEEE Symposium on Security and Privacy, pp. 38–54. IEEE (2015)
22.
Zurück zum Zitat Ohrimenko, O., et al.: Oblivious multi-party machine learning on trusted processors. In: USENIX Security Symposium, pp. 619–636. USENIX Association (2016) Ohrimenko, O., et al.: Oblivious multi-party machine learning on trusted processors. In: USENIX Security Symposium, pp. 619–636. USENIX Association (2016)
23.
Zurück zum Zitat Kim, S.M., Han, J., Ha, J., Kim, T., Han, D.: Enhancing security and privacy of Tor’s ecosystem by using trusted execution environments. In: 14th USENIX Symposium on Networked Systems Design and Implementation, pp. 145–161. USENIX Association (2017) Kim, S.M., Han, J., Ha, J., Kim, T., Han, D.: Enhancing security and privacy of Tor’s ecosystem by using trusted execution environments. In: 14th USENIX Symposium on Networked Systems Design and Implementation, pp. 145–161. USENIX Association (2017)
24.
Zurück zum Zitat Hunt, T., Zhu, Z., Xu, Y., Peter, S., Witchel, E.: Ryoan: a distributed sandbox for untrusted computation on secret data. In: USENIX Conference on Operating Systems Design and Implementation, pp. 533–549. USENIX Association (2016) Hunt, T., Zhu, Z., Xu, Y., Peter, S., Witchel, E.: Ryoan: a distributed sandbox for untrusted computation on secret data. In: USENIX Conference on Operating Systems Design and Implementation, pp. 533–549. USENIX Association (2016)
25.
Zurück zum Zitat Kobza, J.E., Jacobson, S.H., Vaughan, D.E.: A survey of the coupon collectors problem with random sample sizes. Methodol. Comput. Appl. Probab. 9(4), 573–584 (2007)MathSciNetCrossRef Kobza, J.E., Jacobson, S.H., Vaughan, D.E.: A survey of the coupon collectors problem with random sample sizes. Methodol. Comput. Appl. Probab. 9(4), 573–584 (2007)MathSciNetCrossRef
Metadaten
Titel
Harden Tamper-Proofing to Combat MATE Attack
verfasst von
Zhe Chen
Chunfu Jia
Tongtong Lv
Tong Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_9