fbpx
Wikipedia

Anti-tamper software

Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified.[1] It is essentially tamper resistance implemented in the software domain. It shares certain aspects but also differs from related technologies like copy protection and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no provably secure software anti-tampering methods; thus, the field is an arms race between attackers and software anti-tampering technologies.[2]

Tampering can be malicious, to gain control over some aspect of the software with an unauthorized modification that alters the computer program code and behaviour. Examples include installing rootkits and backdoors, disabling security monitoring, subverting authentication, malicious code injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of software piracy, code interference to extract data or algorithms[3] and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance.[citation needed]

Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as malware scanners and anti-virus applications. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as cyclic redundancy checksums,[4] anti-debugging measures, encryption or obfuscation.[5] Execution inside a virtual machine has become a common anti-tamper method used in recent years for commercial software; it is used for example in StarForce and SecuROM.[6] Some anti-tamper software uses white-box cryptography, so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger.[7] A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified.[2] A simple (and easily defeated) scheme of this kind was used in the Diablo II video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.[8]

Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems, anti-cheating in games, military,[9] license management software, and digital rights management (DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them.[10] Malicious software itself can and has been observed using anti-tampering techniques, for example the Mariposa botnet.[11]

See also edit

References edit

  1. ^ Arnold, Michael; Schmucker, Martin; Wolthusen, Stephen D. (1 January 2003). Techniques and Applications of Digital Watermarking and Content Protection. Artech House. p. 229. ISBN 978-1-58053-664-6.
  2. ^ a b Jakubowski, M. H.; Saw, C. W. (N.); Venkatesan, R. (2009). "Tamper-Tolerant Software: Modeling and Implementation". Advances in Information and Computer Security (PDF). Lecture Notes in Computer Science. Vol. 5824. pp. 125–139. doi:10.1007/978-3-642-04846-3_9. ISBN 978-3-642-04845-6.
  3. ^ Cappaert, J.; Preneel, B. (2010). "A general model for hiding control flow". Proceedings of the tenth annual ACM workshop on Digital rights management - DRM '10 (PDF). p. 35. doi:10.1145/1866870.1866877. ISBN 9781450300919. S2CID 3755320.
  4. ^ "Keeping the Pirates at Bay". Gamasutra. Retrieved 2013-12-24.
  5. ^ Chaboya, David (20 June 2007). (PDF) (Technical report). Anti-Tamper and Software Protection Initiative Technology Office, Air Force Research Laboratory. Archived from the original (PDF) on 27 December 2013. Retrieved 24 December 2013.
  6. ^ Guillot, Y.; Gazet, A. (2009). "Semi-automatic binary protection tampering" (PDF). Journal in Computer Virology. 5 (2): 119–149. doi:10.1007/s11416-009-0118-4. S2CID 7165477.
  7. ^ Oorschot, P. C. (2003). "Revisiting Software Protection". Information Security (PDF). Lecture Notes in Computer Science. Vol. 2851. pp. 1–13. doi:10.1007/10958513_1. ISBN 978-3-540-20176-2.
  8. ^ Davis, Steven B. (2008). Protecting Games. Cengage Learning. p. 135. ISBN 978-1-58450-687-4.
  9. ^ Keller, John. "Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics". Militaryaerospace.com. Retrieved 2013-12-24.
  10. ^ Honig, Andrew (2012). Practical Malware Analysis. No Starch Press. p. 400. ISBN 978-1-59327-430-6.
  11. ^ Sinha, P.; Boukhtouta, A.; Belarde, V. H.; Debbabi, M. (2010). "Insights from the analysis of the Mariposa botnet". (PDF). p. 1. doi:10.1109/CRISIS.2010.5764915. ISBN 978-1-4244-8641-0. S2CID 12673670. Archived from the original (PDF) on 2012-09-16. Retrieved 2015-09-04.

anti, tamper, software, this, article, needs, additional, citations, verification, please, help, improve, this, article, adding, citations, reliable, sources, unsourced, material, challenged, removed, find, sources, news, newspapers, books, scholar, jstor, dec. This article needs additional citations for verification Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Anti tamper software news newspapers books scholar JSTOR December 2013 Learn how and when to remove this template message Anti tamper software is software which makes it harder for an attacker to modify it The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper detection techniques which aim to make a program malfunction or not operate at all if modified 1 It is essentially tamper resistance implemented in the software domain It shares certain aspects but also differs from related technologies like copy protection and trusted hardware though it is often used in combination with them Anti tampering technology typically makes the software somewhat larger and also has a performance impact There are no provably secure software anti tampering methods thus the field is an arms race between attackers and software anti tampering technologies 2 Tampering can be malicious to gain control over some aspect of the software with an unauthorized modification that alters the computer program code and behaviour Examples include installing rootkits and backdoors disabling security monitoring subverting authentication malicious code injection for the purposes of data theft or to achieve higher user privileges altering control flow and communication license code bypassing for the purpose of software piracy code interference to extract data or algorithms 3 and counterfeiting Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance citation needed Anti tamper protection can be applied as either internally or externally to the application being protected External anti tampering is normally accomplished by monitoring the software to detect tampering This type of defense is commonly expressed as malware scanners and anti virus applications Internal anti tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens This type of tamper proofing defense may take the form of runtime integrity checks such as cyclic redundancy checksums 4 anti debugging measures encryption or obfuscation 5 Execution inside a virtual machine has become a common anti tamper method used in recent years for commercial software it is used for example in StarForce and SecuROM 6 Some anti tamper software uses white box cryptography so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger 7 A more recent research trend is tamper tolerant software which aims to correct the effects of tampering and allow the program to continue as if unmodified 2 A simple and easily defeated scheme of this kind was used in the Diablo II video game which stored its critical player data in two copies at different memory locations and if one was modified externally the game used the lower value 8 Anti tamper software is used in many types of software products including embedded systems financial applications software for mobile devices network appliance systems anti cheating in games military 9 license management software and digital rights management DRM systems Some general purpose packages have been developed which can wrap existing code with minimal programing effort for example the SecuROM and similar kits used in the gaming industry though they have the downside that semi generic attacking tools also exist to counter them 10 Malicious software itself can and has been observed using anti tampering techniques for example the Mariposa botnet 11 See also editHardening computing Fault tolerance Denuvo Digital rights managementReferences edit Arnold Michael Schmucker Martin Wolthusen Stephen D 1 January 2003 Techniques and Applications of Digital Watermarking and Content Protection Artech House p 229 ISBN 978 1 58053 664 6 a b Jakubowski M H Saw C W N Venkatesan R 2009 Tamper Tolerant Software Modeling and Implementation Advances in Information and Computer Security PDF Lecture Notes in Computer Science Vol 5824 pp 125 139 doi 10 1007 978 3 642 04846 3 9 ISBN 978 3 642 04845 6 Cappaert J Preneel B 2010 A general model for hiding control flow Proceedings of the tenth annual ACM workshop on Digital rights management DRM 10 PDF p 35 doi 10 1145 1866870 1866877 ISBN 9781450300919 S2CID 3755320 Keeping the Pirates at Bay Gamasutra Retrieved 2013 12 24 Chaboya David 20 June 2007 State of the Practice of Software Anti Tamper PDF Technical report Anti Tamper and Software Protection Initiative Technology Office Air Force Research Laboratory Archived from the original PDF on 27 December 2013 Retrieved 24 December 2013 Guillot Y Gazet A 2009 Semi automatic binary protection tampering PDF Journal in Computer Virology 5 2 119 149 doi 10 1007 s11416 009 0118 4 S2CID 7165477 Oorschot P C 2003 Revisiting Software Protection Information Security PDF Lecture Notes in Computer Science Vol 2851 pp 1 13 doi 10 1007 10958513 1 ISBN 978 3 540 20176 2 Davis Steven B 2008 Protecting Games Cengage Learning p 135 ISBN 978 1 58450 687 4 Keller John Anti tamper technologies seek to keep critical military systems data in the right hands Military amp Aerospace Electronics Militaryaerospace com Retrieved 2013 12 24 Honig Andrew 2012 Practical Malware Analysis No Starch Press p 400 ISBN 978 1 59327 430 6 Sinha P Boukhtouta A Belarde V H Debbabi M 2010 Insights from the analysis of the Mariposa botnet 2010 Fifth International Conference on Risks and Security of Internet and Systems CRiSIS PDF p 1 doi 10 1109 CRISIS 2010 5764915 ISBN 978 1 4244 8641 0 S2CID 12673670 Archived from the original PDF on 2012 09 16 Retrieved 2015 09 04 Retrieved from https en wikipedia org w index php title Anti tamper software amp oldid 1176517183, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.