Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography

被引:0
作者
Michiels, Wil [1 ]
Gorissen, Paul [1 ]
机构
[1] Philips Res Labs, Eindhoven, Netherlands
来源
DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT | 2007年
关键词
Software protection; software tamper resistance; white-box cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over its execution. The goal of white-box cryptography is to implement cryptographic algorithms in software such that it is hard for an attacker to extract the key by a white-box attack. Chow et al.[8, 7] present white-box implementations for AES and DES. Based on their ideas, white-box implementations can be derived for other block ciphers as well. In the white-box implementations the key of the underlying block cipher is expanded from several bytes to a collection of lookup tables with a total size in the order of hundreds of kilobytes. In this paper we present a technique that uses a white-box implementation to make software tamper resistant. The technique interprets the binary of software code as lookup tables, which are next incorporated into the collection of lookup tables of a white-box implementation. This makes the code tamper resistant as the dual interpretation implies that a change in the code results in an unintentional change in the white-box implementation. We also indicate in the paper that it is difficult for an attacker to make modifications to the white-box implementation such that its original operation is restored.
引用
收藏
页码:82 / 89
页数:8
相关论文
共 23 条
[1]  
AUCSMITH D, 1996, P 1 INT WORKSH INF H, P317
[2]  
Barak B., 2001, P 21 ANN INT CRYPT C, P1
[3]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[4]  
BLIETZ B, 2005, P 1 INT C DIG RIGHTS
[5]  
CHANG H, 2001, P ACM WORKSH SEC PRI, P160
[6]  
CHEN Y, 2002, P 5 INT WORKSH INF H, P400
[7]  
Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
[8]  
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[9]  
COHEN F, 1993, COMPUT SECUR, P565
[10]  
Collberg C., 1997, Citeseer