2018
DOI: 10.1007/978-3-319-76687-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…In particular, the shouldBePrecededBy and shouldNotBePrecededBy associations are respectively used to specify that an applied protection instance should or should not be preceded by another applied protection instance of a given kind. This is useful when choosing the best solution since one protection can make another, previously applied protection stronger (e.g., software remote attestation [26] can be made more robust if coupled with antidebugging [27]), but applying one protection can also make a later one weaker (e.g., a control flow obfuscation applied first can negatively impact the data flow analysis that checks preconditions for applying a data obfuscation), thus affecting the aggressiveness with which the data obfuscation can be applied. Furthermore, the cannotBePrecededBy relationship is used to model impossible sequences of protections that can lead to incoherent or non-compilable applications (e.g., software remote attestation is usually the last protection to be put, since altering the code after its deployment will trigger an invalid attestation).…”
Section: The Protection Meta-modelmentioning
confidence: 99%
“…In particular, the shouldBePrecededBy and shouldNotBePrecededBy associations are respectively used to specify that an applied protection instance should or should not be preceded by another applied protection instance of a given kind. This is useful when choosing the best solution since one protection can make another, previously applied protection stronger (e.g., software remote attestation [26] can be made more robust if coupled with antidebugging [27]), but applying one protection can also make a later one weaker (e.g., a control flow obfuscation applied first can negatively impact the data flow analysis that checks preconditions for applying a data obfuscation), thus affecting the aggressiveness with which the data obfuscation can be applied. Furthermore, the cannotBePrecededBy relationship is used to model impossible sequences of protections that can lead to incoherent or non-compilable applications (e.g., software remote attestation is usually the last protection to be put, since altering the code after its deployment will trigger an invalid attestation).…”
Section: The Protection Meta-modelmentioning
confidence: 99%