The Community for Technology Leaders
Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on (2010)
Hong Kong, China
Dec. 11, 2010 to Dec. 13, 2010
ISBN: 978-0-7695-4322-2
pp: 777-784
In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({\em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.
software protection, code externalization, Java

O. Ly, R. Tabary and S. Chaumette, "Automated Software Protection through Program Externalization on Memory-Limited Secure Devices," 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010)(EUC), Hong Kong, 2010, pp. 777-784.
170 ms
(Ver 3.1 (10032016))