Skip to main content

Reduction of Data Leakage Using Software Streaming

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2019)

Abstract

With the increase in threats to IoT devices, interest in protecting sensitive data within such devices has intensified. For devices holding sensitive data and intellectual property software, such as military equipment, leakage of the confidential data contained within the device can cause catastrophic damage. Therefore, it is important to prevent such leakage of sensitive data. In this paper, we propose a method for reducing data leakage from military devices by minimizing the quantity of data that exist within the non-volatile memory of the device. To achieve minimization of the data loaded in non-volatile memory, we run the software in a streaming manner. However, as the execution of software over a network can result in suspension of the software depending on the state of the network, this approach can have a critical impact on system stability. Therefore, we also present a scheme to apply multi-channel communication to reduce software suspensions caused by network delays when the software is run in a streaming manner for the purpose of mitigating damage to the data leakage.

This work was supported by the National Research Foundation of Korea (NRF) (NRF-2020R1A2C4002737) and the Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-00420).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Iraq-RQ-170 Homepage. https://www.wired.com/2011/12/iran-drone-hack-gps/. Accessed 22 Jan 2020

  2. Iran-RQ-170 Homepage. https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer. Accessed 22 Jan 2020

  3. Banescu, S., Collberg, C., Ganesh, V., Newsham, Z., Pretschner, A.: Code obfuscation against symbolic execution attacks. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 189–200 (2016)

    Google Scholar 

  4. Fang, H., Wu, Y., Wang, S., Huang, Y.: Multi-stage binary code obfuscation using improved virtual machine. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 168–181. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24861-0_12

    Chapter  Google Scholar 

  5. Xue, C., et al.: Exploiting code diversity to enhance code virtualization protection. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp. 620–627. IEEE (2018)

    Google Scholar 

  6. VMProtect Homepage. https://vmpsoft.com/. Accessed 22 Jan 2020

  7. Themida Homepage. https://www.oreans.com/themida.php. Accessed 22 Jan 2020

  8. Kim, M.-J., et al.: Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering. In: 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, pp. 80–86. IEEE (2010)

    Google Scholar 

  9. Suk, J.H., Lee, J.Y., Jin, H., Kim, I.S., Lee, D.H.: UnThemida: commercial obfuscation technique analysis with a fully obfuscated program. Softw. Pract. Exp. 48(12), 2331–2349 (2018)

    Article  Google Scholar 

  10. Yadegari, B., Johannesmeyer, B., Whitely, B., Debray, S.: A generic approach to automatic deobfuscation of executable code. In: 2015 IEEE Symposium on Security and Privacy, pp. 674–691. IEEE (2015)

    Google Scholar 

  11. Hasan, S., Awais, M., Shah, M.A.: Full disk encryption: a comparison on data management attributes. In: Proceedings of the 2nd International Conference on Information System and Data Mining, pp. 39–43 (2018)

    Google Scholar 

  12. Kuacharoen, P., Mooney, V.J., Madisetti, V.K.: Software streaming via block streaming. In: Jerraya, A.A., Yoo, S., Verkest, D., Wehn, N. (eds.) Embedded Software for SoC, pp. 435–448. Springer, Boston (2003). https://doi.org/10.1007/0-306-48709-8_32

    Chapter  Google Scholar 

  13. Kuacharoen, P., Mooney III, V.J., Madisetti, V.K.: Efficient execution of large applications on portable and wireless clients. In: Proceedings of the Mobility Conference & Exhibition (2004)

    Google Scholar 

  14. Choi, J., Kim, J., Jang, B.: A software wireless streaming architecture supporting telematics device. In: 2007 Digest of Technical Papers International Conference on Consumer Electronics, pp. 1–2. IEEE (2007)

    Google Scholar 

  15. Tomasulo, R.M.: An efficient algorithm for exploiting multiple arithmetic units. IBM J. Res. Develop. 11(1), 25–33 (1967)

    Article  Google Scholar 

  16. Shield, D.J., Davis, D.L.: Method and apparatus for fast self-destruction of a CMOS integrated circuit. U.S. Patent 5,736,777, issued 7 April 1998

    Google Scholar 

  17. Mishra, P.K., Goyal, D.: Directed fragmentation for unmanned airborne vehicles. U.S. Patent 9,828,097, issued 28 November 2017

    Google Scholar 

  18. Banerjee, N., Xie, Y., Rahman, M.M., Kim, H., Mastrangelo, C.H.: From chips to dust: the MEMS shatter secure chip. In: 2014 IEEE 27th International Conference on Micro Electro Mechanical Systems (MEMS), pp. 1123–1126. IEEE (2014)

    Google Scholar 

  19. Gu, X., Lou, W., Song, R., Zhao, Y., Zhang, L.: Simulation research on a novel micro-fluidic self-destruct device for microchips. In: 2010 IEEE 5th International Conference on Nano/Micro Engineered and Molecular Systems, pp. 375–378. IEEE (2010)

    Google Scholar 

  20. Kim, S., Youn, T.-Y., Choi, D., Park, K.-W.: UAV-undertaker: securely verifiable remote erasure scheme with a countdown-concept for UAV via randomized data synchronization. Wirel. Commun. Mob. Comput. 2019, 1–11 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki-Woong Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, SK., Jang, ET., Lim, SH., Park, KW. (2020). Reduction of Data Leakage Using Software Streaming. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9609-4_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9608-7

  • Online ISBN: 978-981-15-9609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics