Font Size: a A A

Key Techniques And Application For Embedded Software Protection

Posted on:2012-03-14Degree:DoctorType:Dissertation
Country:ChinaCandidate:X C LuFull Text:PDF
GTID:1228330368986197Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the widely use of embedded system in all areas of human life, they have been illegally invaded destructed more and more seriously, which have cause great economic losses for our country and society, sometimes it even threaten the security of country and society Therefore the security of embedded system is a hot issue to solve at present, which needs sufficient attention to solve.At the beginning, the paper analyzed the security and its safety need which the embedded system faced with, discussed the architecture of the embedded system, coming up with a secure embedded architecture SESS, which can better solve the security issue the embedded system faced with, at present, presenting the main content of the security police and design police of the embedded system, In order to better protect the embedded system, the paper proposed new methods and technology on embedded software encryption, embedded software watermark, embedded software obfuscation and so on, hoping to solve the main problem of embedded system protection.The main content of research of the paper1. The Security Architecture of Embedded SystemDue to the gradually mature and disclosure of hardware technique, the hardware cost falling continuous, the consideration of how to protect the design and copyright of the product, converting to the protection of embedded application software. This section studied and analyzed the security and relevant security theory the embedded system faced with,and studied deeply on the architecture of embedded system, thus came up with the safety embedded system architecture, the architecture can better solve the security issue the embedded system faced for the moment. The paper studied the security police and design police of the design of and the key point of constructing safety embedded system.2. Embedded Software Encryption TechnologyThe paper focus on the study of the layered, identity based encryption scheme and Key-Insulation mechanism, to explore more efficient and safer identity based encryption scheme and Key-Insulation scheme, improving the protection technology of embedded system. The article will use HIBE to improve the security of identity based encryption system and provide formal proof for the security of HIBE. The study of the specific process and arithmetic statement of identity based Key-Insulation mechanism proved the identity based Key-Insulation mechanism is to chose safe ciphertext, providing reliable premise for the obfuscation of encryption model with HIBE, on the basis of studying of HIBE scheme and Key-Insulation mechanism, coming up with HIKE encryption model. In this model,the problem of high burden threat of single PKG is solved and finish the update of encryption with less interact at the same time, and support offline update。3. Embedded Software WatermarkingAs a new technology of software protection, software watermarking provides new way of protecting intellectual property and tracking piracy. The article studied topological structure, encoding, arithmetic and protection measure, according to the feature of embedded system, carrying out a kind of software watermark scheme with tampering proofing. The tampering proofing software watermark proposed in the paper with high data rate. At the same time, it combines the code from testing technology with encrypted code to enhance the software watermark against attack performance.4. Embedded Software Obfuscation TechnologyThe paper introduced basic theory and method of software obfuscation. Detailed analyzed and explain were done to several common software obfuscation models. Based on the feature of code obfuscation and the design idea of Zero-Watermarking, the Zero-Watermarking design scheme based on code obfuscation was proposed. Its core idea is embed the coded watermark message into software, without adding redundant watermark message, thereby improving the security of watermark.
Keywords/Search Tags:Embedded System, Key-Insulation, Zero-Watermarking, Code Obfuscation, Tamper-proofing
PDF Full Text Request
Related items