Establishment of a practical software protection method is a major issue in software distribution. There are several approaches to the issue; however, no practical, secure method for mobile phone applications has been proposed. In this paper, we propose a new software protection scheme combined with a tamper-proof device (TPD) in order to achieve computational security against illegal analysis and copying of the target program. Our scheme achieves a reasonable level of security for encoding the data and variables in a program. The program on a mobile phone deals only with encoded data that is difficult to compromise, and the TPD plays a role of decoding execution results. We implemented the proposed scheme on a 3G mobile phone and a user identification module (UIM). An analysis and copying of the protected program impose exponential computation complexities under our attack model.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Yutaka MIYAKE, "Software Protection Combined with Tamper-Proof Device" in IEICE TRANSACTIONS on Fundamentals,
vol. E95-A, no. 1, pp. 213-222, January 2012, doi: 10.1587/transfun.E95.A.213.
Abstract: Establishment of a practical software protection method is a major issue in software distribution. There are several approaches to the issue; however, no practical, secure method for mobile phone applications has been proposed. In this paper, we propose a new software protection scheme combined with a tamper-proof device (TPD) in order to achieve computational security against illegal analysis and copying of the target program. Our scheme achieves a reasonable level of security for encoding the data and variables in a program. The program on a mobile phone deals only with encoded data that is difficult to compromise, and the TPD plays a role of decoding execution results. We implemented the proposed scheme on a 3G mobile phone and a user identification module (UIM). An analysis and copying of the protected program impose exponential computation complexities under our attack model.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E95.A.213/_p
Copy
@ARTICLE{e95-a_1_213,
author={Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Yutaka MIYAKE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Software Protection Combined with Tamper-Proof Device},
year={2012},
volume={E95-A},
number={1},
pages={213-222},
abstract={Establishment of a practical software protection method is a major issue in software distribution. There are several approaches to the issue; however, no practical, secure method for mobile phone applications has been proposed. In this paper, we propose a new software protection scheme combined with a tamper-proof device (TPD) in order to achieve computational security against illegal analysis and copying of the target program. Our scheme achieves a reasonable level of security for encoding the data and variables in a program. The program on a mobile phone deals only with encoded data that is difficult to compromise, and the TPD plays a role of decoding execution results. We implemented the proposed scheme on a 3G mobile phone and a user identification module (UIM). An analysis and copying of the protected program impose exponential computation complexities under our attack model.},
keywords={},
doi={10.1587/transfun.E95.A.213},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Software Protection Combined with Tamper-Proof Device
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 213
EP - 222
AU - Kazuhide FUKUSHIMA
AU - Shinsaku KIYOMOTO
AU - Yutaka MIYAKE
PY - 2012
DO - 10.1587/transfun.E95.A.213
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E95-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2012
AB - Establishment of a practical software protection method is a major issue in software distribution. There are several approaches to the issue; however, no practical, secure method for mobile phone applications has been proposed. In this paper, we propose a new software protection scheme combined with a tamper-proof device (TPD) in order to achieve computational security against illegal analysis and copying of the target program. Our scheme achieves a reasonable level of security for encoding the data and variables in a program. The program on a mobile phone deals only with encoded data that is difficult to compromise, and the TPD plays a role of decoding execution results. We implemented the proposed scheme on a 3G mobile phone and a user identification module (UIM). An analysis and copying of the protected program impose exponential computation complexities under our attack model.
ER -