The Community for Technology Leaders
Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on (2010)
Hong Kong, China
Dec. 11, 2010 to Dec. 13, 2010
ISBN: 978-0-7695-4322-2
pp: 777-784
ABSTRACT
In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({\em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.
INDEX TERMS
software protection, code externalization, Java
CITATION

O. Ly, R. Tabary and S. Chaumette, "Automated Software Protection through Program Externalization on Memory-Limited Secure Devices," 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010)(EUC), Hong Kong, 2010, pp. 777-784.
doi:10.1109/EUC.2010.122
170 ms
(Ver 3.1 (10032016))