skip to main content
10.1145/2928275.2928281acmconferencesArticle/Chapter ViewAbstractPublication PagessystorConference Proceedingsconference-collections
research-article

Helping Protect Software Distribution with PSWD

Published:06 June 2016Publication History

ABSTRACT

The success of new technologies depends on whether proper usage models can be found to support them. In this paper we present such a model for Intel's Software Guard Extensions (SGX) -- the leveraging of the technology to provide copy protection to software. We describe the system that we architected, designed and implemented, which transforms, in a fully automated manner, off-the-shelve applications into secured versions that run on top of the enclaves. Our system can be delivered as stand-alone, but also as a layer in existing software copy protection stacks.

References

  1. BSA. http://globalstudy.bsa.org/2013/downloads/studies/2013GlobalSurvey_Study_en.pdf.Google ScholarGoogle Scholar
  2. Microcosm. http://www.microcosm.co.uk.Google ScholarGoogle Scholar
  3. Wibu-Systems. http://www.wibu.com.Google ScholarGoogle Scholar
  4. A. Balakrishnan and C. Schulze. Code obfuscation literature survey. http://pages.cs.wisc.edu/arinib/writeup.pdf, 2005.Google ScholarGoogle Scholar
  5. A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pages 267--283, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Checkoway and H. Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 253--264, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations, 1997.Google ScholarGoogle Scholar
  8. I. Corp. Software Guard Extensions Programming Reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf, 2014.Google ScholarGoogle Scholar
  9. C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 190--200, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. W. O'Donnell, G. E. Suh, M. van Dijk, and S. Devadas. Memoization attacks and copy protection in partitioned applications. In Proceedings of the 2007 IEEE Workshop on Information Assurance (IAW), 2007.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Venable, M. R. Chouchane, M. E. Karim, and A. Lakhotia. Analyzing memory accesses in obfuscated x86 executables. In Proceedings of the Second International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'05, pages 1--18. Springer-Verlag, 2005. ISBN 3-540-26613-5, 978-3-540-26613-6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. S. Wallach. Copy protection technology is doomed. IEEE Computer, 34(10):48--49, Oct. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Ying, P. Su, D. Feng, X. Wang, Y. Yang, and Y. Liu. Reconbin: Reconstructing binary file from execution for software analysis. In Third IEEE International Conference ob Secure Software Integration and Reliability Improvement, pages 222-- 229, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. X. Zhang and R. Gupta. Hiding program slices for software security. In 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 23-26 March 2003, San Francisco, CA, USA, pages 325--336, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Helping Protect Software Distribution with PSWD

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SYSTOR '16: Proceedings of the 9th ACM International on Systems and Storage Conference
        June 2016
        191 pages
        ISBN:9781450343817
        DOI:10.1145/2928275

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 June 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        SYSTOR '16 Paper Acceptance Rate16of49submissions,33%Overall Acceptance Rate94of285submissions,33%

        Upcoming Conference

        SYSTOR '24
        The 17th ACM International Systems and Storage Conference
        September 23 - 25, 2024
        Tel-Aviv , Israel
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader