393 research outputs found

    Software Obfuscation with Symmetric Cryptography

    Get PDF
    Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company‘s proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software’s sensitive internal algorithms, from adversarial analysis. Software protection through obfuscation is a relatively new research initiative. The mathematical and security community have yet to agree upon a model to describe the problem let alone the metrics used to evaluate the practical solutions proposed by computer scientists. We propose evaluating solutions to obfuscation under the intent protection model, a combination of white-box and black-box protection to reflect how reverse engineers analyze programs using a combination white-box and black-box attacks. In addition, we explore use of experimental methods and metrics in analogous and more mature fields of study such as hardware circuits and cryptography. Finally, we implement a solution under the intent protection model that demonstrates application of the methods and evaluation using the metrics adapted from the aforementioned fields of study to reflect the unique challenges in a software-only software protection technique

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?

    Get PDF
    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent today’s software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools. The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p

    Utilização da Norma JPEG2000 para codificar proteger e comercializar Produtos de Observação Terrestre

    Get PDF
    Applications like, change detection, global monitoring, disaster detection and management have emerging requirements that need the availability of large amounts of data. This data is currently being capture by a multiplicity of instruments and EO (Earth Observation) sensors originating large volumes of data that needs to be stored, processed and accessed in order to be useful – as an example, ENVISAT accumulates, in a yearly basis, several hundred terabytes of data. This need to recover, store, process and access brings some interesting challenges, like storage space, processing power, bandwidth and security, just to mention a few. These challenges are still very important on today’s technological world. If we take a look for example at the number of subscribers of ISP (Internet Service Providers) broadband services on the developed world today, one can notice that broadband services are still far from being common and dominant. On the underdeveloped countries the picture is even dimmer, not only from a bandwidth point of view but also in all other aspects regarding information and communication technologies (ICTs). All this challenges need to be taken into account if a service is to reach the broadest audience possible. Obviously protection and securing of services and contents is an extra asset that helps on the preservation of possible business values, especially if we consider such a costly business as the space industry. This thesis presents and describes a system which allows, not only the encoding and decoding of several EO products into a JPEG2000 format, but also supports some of the security requirements identified previously that allows ESA (European Space Agency) and related EO services to define and apply efficient EO data access security policies and even to exploit new ways to commerce EO products over the Internet.AplicaçÔes como, detecção de mudanças no terreno, monitorização planetĂĄria, detecção e gestĂŁo de desastres, tĂȘm necessidades prementes que necessitam de vastas quantidades de dados. Estes dados estĂŁo presentemente a ser capturados por uma multiplicidade de instrumentos e sensores de observação terrestre, que originam uma enormidade de dados que necessitam de ser armazenados processados e acedidos de forma a se tornarem Ășteis – por exemplo, a ENVISAT acumula anualmente varias centenas de terabytes de dados. Esta necessidade de recuperar, armazenar, processar e aceder introduz alguns desafios interessantes como o espaço de armazenamento, poder de processamento, largura de banda e segurança dos dados sĂł para mencionar alguns. Estes desafios sĂŁo muito importantes no mundo tecnolĂłgico de hoje. Se olharmos, por exemplo, ao nĂșmero actual de subscritores de ISP (Internet Service Providers) de banda larga nos paĂ­ses desenvolvidos podemos ficar surpreendidos com o facto do nĂșmero de subscritores desses serviços ainda nĂŁo ser uma maioria da população ou dos agregados familiares. Nos paĂ­ses subdesenvolvidos o quadro Ă© ainda mais negro nĂŁo sĂł do ponto de vista da largura de banda mas tambĂ©m de todos os outros aspectos relacionados com Tecnologias da Informação e Comunicação (TICs). Todos estes aspectos devem ser levados em consideração se se pretende que um serviço se torne o mais abrangente possĂ­vel em termos de audiĂȘncias. Obviamente a protecção e segurança dos conteĂșdos Ă© um factor extra que ajuda a preservar possĂ­veis valores de negĂłcio, especialmente considerando industrias tĂŁo onerosas como a Industria Espacial. Esta tese apresenta e descreve um sistema que permite, nĂŁo sĂł a codificação e descodificação de diversos produtos de observação terrestre para formato JPEG2000 mas tambĂ©m o suporte de alguns requisitos de segurança identificados previamente que permitem, ĂĄ AgĂȘncia Espacial Europeia e a outros serviços relacionados com observação terrestre, a aplicação de politicas eficientes de acesso seguro a produtos de observação terrestre, permitindo atĂ© o aparecimento de novas forma de comercialização de produtos de observação terrestre atravĂ©s da Internet

    Framework for privacy-aware content distribution in peer-to- peer networks with copyright protection

    Get PDF
    The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. This mass popularity is primarily driven by the efficient distribution of content, also giving rise to piracy and copyright infringement as well as privacy concerns. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further redistribute the content illegally. Therefore, there is a strong need for content distribution mechanisms over P2P networks that do not pose security and privacy threats to copyright holders and end users, respectively. However, the current systems being developed to provide copyright and privacy protection to merchants and end users employ cryptographic mechanisms, which incur high computational and communication costs, making these systems impractical for the distribution of big files, such as music albums or movies.El uso de soluciones de igual a igual (peer-to-peer, P2P) para la distribuciĂłn multimedia se ha extendido mundialmente en los Ășltimos años. La amplia popularidad de este paradigma se debe, principalmente, a la distribuciĂłn eficiente de los contenidos, pero tambiĂ©n da lugar a la piraterĂ­a, a la violaciĂłn del copyright y a problemas de privacidad. Un usuario final (comprador) de un sistema de distribuciĂłn de contenidos P2P no quiere revelar su identidad durante una transacciĂłn con un propietario de contenidos (comerciante), mientras que el comerciante no quiere que el comprador pueda redistribuir ilegalmente el contenido mĂĄs adelante. Por lo tanto, existe una fuerte necesidad de mecanismos de distribuciĂłn de contenidos por medio de redes P2P que no supongan un riesgo de seguridad y privacidad a los titulares de derechos y los usuarios finales, respectivamente. Sin embargo, los sistemas actuales que se desarrollan con el propĂłsito de proteger el copyright y la privacidad de los comerciantes y los usuarios finales emplean mecanismos de cifrado que implican unas cargas computacionales y de comunicaciones muy elevadas que convierten a estos sistemas en poco prĂĄcticos para distribuir archivos de gran tamaño, tales como ĂĄlbumes de mĂșsica o pelĂ­culas.L'Ășs de solucions d'igual a igual (peer-to-peer, P2P) per a la distribuciĂł multimĂšdia s'ha estĂšs mundialment els darrers anys. L'Ă mplia popularitat d'aquest paradigma es deu, principalment, a la distribuciĂł eficient dels continguts, perĂČ tambĂ© dĂłna lloc a la pirateria, a la violaciĂł del copyright i a problemes de privadesa. Un usuari final (comprador) d'un sistema de distribuciĂł de continguts P2P no vol revelar la seva identitat durant una transacciĂł amb un propietari de continguts (comerciant), mentre que el comerciant no vol que el comprador pugui redistribuir il·legalment el contingut mĂ©s endavant. Per tant, hi ha una gran necessitat de mecanismes de distribuciĂł de continguts per mitjĂ  de xarxes P2P que no comportin un risc de seguretat i privadesa als titulars de drets i els usuaris finals, respectivament. Tanmateix, els sistemes actuals que es desenvolupen amb el propĂČsit de protegir el copyright i la privadesa dels comerciants i els usuaris finals fan servir mecanismes d'encriptaciĂł que impliquen unes cĂ rregues computacionals i de comunicacions molt elevades que fan aquests sistemes poc prĂ ctics per a distribuir arxius de grans dimensions, com ara Ă lbums de mĂșsica o pel·lĂ­cules
    • 

    corecore