Publication | Closed Access
A Generic Attack on Checksumming-Based Software Tamper Resistance
126
Citations
15
References
2005
Year
Unknown Venue
Program CheckingEngineeringInformation SecurityRich FunctionalityVerificationInformation ForensicsFormal VerificationSoftware AnalysisX86-compatible ProcessorsTrusted Execution EnvironmentRuntime VerificationSelf-checking ProgramsComputer EngineeringSecure By DesignComputer ScienceGeneric AttackData SecurityCryptographySoftware SecurityProgram AnalysisSoftware TestingSystem SoftwareIntegrity Verification
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002) have been promoted as an alternative to other software integrity verification techniques. Appealing aspects include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability to automatically integrate checksumming code during program compilation or linking. In this paper we show that the rich functionality of many modern processors, including UltraSparc and x86-compatible processors, facilitates automated attacks which defeat such checksumming by self-checking programs.
| Year | Citations | |
|---|---|---|
2004 | 922 | |
2002 | 724 | |
2004 | 690 | |
2000 | 600 | |
2004 | 449 | |
1994 | 447 | |
2014 | 439 | |
1999 | 335 | |
2000 | 223 | |
2003 | 182 |
Page 1
Page 1