Anti-tamper software: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
No edit summary
Line 9: Line 9:
Tampering is generally malicious, to gain control over some aspect of the software with an unauthorized modification that alters the [[software program]] code and behaviour. Examples include installing [[rootkits]] and [[backdoor]]s, disabling security monitoring, subverting authentication, [[malicious code]] injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of [[software piracy]], code interference to extract data or algorithms<ref>{{cite doi|10.1145/1866870.1866877}}</ref> and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance.
Tampering is generally malicious, to gain control over some aspect of the software with an unauthorized modification that alters the [[software program]] code and behaviour. Examples include installing [[rootkits]] and [[backdoor]]s, disabling security monitoring, subverting authentication, [[malicious code]] injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of [[software piracy]], code interference to extract data or algorithms<ref>{{cite doi|10.1145/1866870.1866877}}</ref> and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance.


Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as [[malware scanner]]s and [[anti-virus software|anti-virus applications]]. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as [[cyclic redundancy checksum]]s,<ref>{{cite web|url=http://www.gamasutra.com/view/feature/3030/keeping_the_pirates_at_bay.php |title=Keeping the Pirates at Bay |publisher=Gamasutra |date= |accessdate=2013-12-24}}</ref> [[anti-debugging]] measures, encryption or [[obfuscation (software)|obfuscation]].<ref>David Chaboya, (20 Jun 2007) [http://www.ieee-stc.org/proceedings/2007/pdfs/DC1701.pdf State of the Practice of Software Anti-Tamper]. Air Force Research Labs Anti-Tamper and Software Protection Initiative (AT-SPI) Technology Office</ref> Execution inside a [[virtual machine]] has become a common anti-tamper method used in recent years for commercial software; it is used for example in [[StarForce]], [[Themida]] and [[SecuROM]].<ref>{{cite doi|10.1007/s11416-009-0118-4}}</ref> Some anti-tamper software uses [[white-box cryptography]], so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger. A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified.<ref name="tt"/> A simple (and easily defeated) scheme of this kind was used in the [[Diablo II]] video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.<ref name="Davis2008">{{cite book|author=Steven B. Davis|title=Protecting Games|url=http://books.google.com/books?id=-bALAAAAQBAJ&pg=PA135|year=2008|publisher=Cengage Learning|isbn=1-58450-687-3|page=135}}</ref>
Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as [[malware scanner]]s and [[anti-virus software|anti-virus applications]]. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as [[cyclic redundancy checksum]]s,<ref>{{cite web|url=http://www.gamasutra.com/view/feature/3030/keeping_the_pirates_at_bay.php |title=Keeping the Pirates at Bay |publisher=Gamasutra |date= |accessdate=2013-12-24}}</ref> [[anti-debugging]] measures, encryption or [[obfuscation (software)|obfuscation]].<ref>David Chaboya, (20 Jun 2007) [http://www.ieee-stc.org/proceedings/2007/pdfs/DC1701.pdf State of the Practice of Software Anti-Tamper]. Air Force Research Labs Anti-Tamper and Software Protection Initiative (AT-SPI) Technology Office</ref> Execution inside a [[virtual machine]] has become a common anti-tamper method used in recent years for commercial software; it is used for example in [[StarForce]], [[Themida]] and [[SecuROM]].<ref>{{cite doi|10.1007/s11416-009-0118-4}}</ref> Some anti-tamper software uses [[white-box cryptography]], so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger.<ref> {{cite doi|10.1007/10958513_1}}</ref> A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified.<ref name="tt"/> A simple (and easily defeated) scheme of this kind was used in the [[Diablo II]] video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.<ref name="Davis2008">{{cite book|author=Steven B. Davis|title=Protecting Games|url=http://books.google.com/books?id=-bALAAAAQBAJ&pg=PA135|year=2008|publisher=Cengage Learning|isbn=1-58450-687-3|page=135}}</ref>


Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems, [[Anti-cheat software|anti-cheating in games]], military,<ref>{{cite web|last=Keller |first=John |url=http://www.militaryaerospace.com/articles/2010/04/anti-tamper-technologies-seek-to-keep-critical-military-systems-data-in-the-right-hands.html |title=Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics |publisher=Militaryaerospace.com |date= |accessdate=2013-12-24}}</ref> [[License manager|license management]] software, and [[digital rights management]] (DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them. Malicious software itself can and has been observed using anti-tampering techniques, for example the [[Mariposa botnet]].<ref>{{cite doi|10.1109/CRISIS.2010.5764915}}</ref>
Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems, [[Anti-cheat software|anti-cheating in games]], military,<ref>{{cite web|last=Keller |first=John |url=http://www.militaryaerospace.com/articles/2010/04/anti-tamper-technologies-seek-to-keep-critical-military-systems-data-in-the-right-hands.html |title=Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics |publisher=Militaryaerospace.com |date= |accessdate=2013-12-24}}</ref> [[License manager|license management]] software, and [[digital rights management]] (DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them. Malicious software itself can and has been observed using anti-tampering techniques, for example the [[Mariposa botnet]].<ref>{{cite doi|10.1109/CRISIS.2010.5764915}}</ref>

Revision as of 22:14, 24 December 2013

Anti-tamper software (or tamper-resistant software) is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified.[1] It is essentially tamper resistance implemented in the software domain. It shares certain aspects but also differs from related technologies like copy protection and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no provably secure software anti-tampering methods, thus the field is an arms race between attackers and software anti-tampering technologies.[2]

Tampering is generally malicious, to gain control over some aspect of the software with an unauthorized modification that alters the software program code and behaviour. Examples include installing rootkits and backdoors, disabling security monitoring, subverting authentication, malicious code injection for the purposes of data theft or to achieve higher user privileges, altering control flow and communication, license code bypassing for the purpose of software piracy, code interference to extract data or algorithms[3] and counterfeiting. Software applications are vulnerable to the effects of tampering and code changes throughout their lifecycle from development and deployment to operation and maintenance.

Anti-tamper protection can be applied as either internally or externally to the application being protected. External anti-tampering is normally accomplished by monitoring the software to detect tampering. This type of defense is commonly expressed as malware scanners and anti-virus applications. Internal anti-tampering is used to turn an application into its own security system and is generally done with specific code within the software that will detect tampering as it happens. This type of tamper proofing defense may take the form of runtime integrity checks such as cyclic redundancy checksums,[4] anti-debugging measures, encryption or obfuscation.[5] Execution inside a virtual machine has become a common anti-tamper method used in recent years for commercial software; it is used for example in StarForce, Themida and SecuROM.[6] Some anti-tamper software uses white-box cryptography, so cryptographic keys are not revealed even when cryptographic computations are being observed in complete detail in a debugger.[7] A more recent research trend is tamper-tolerant software, which aims to correct the effects of tampering and allow the program to continue as if unmodified.[2] A simple (and easily defeated) scheme of this kind was used in the Diablo II video game, which stored its critical player data in two copies at different memory locations and if one was modified externally, the game used the lower value.[8]

Anti-tamper software is used in many types of software products including: embedded systems, financial applications, software for mobile devices, network-appliance systems, anti-cheating in games, military,[9] license management software, and digital rights management (DRM) systems. Some general-purpose packages have been developed which can wrap existing code with minimal programing effort; for example the SecuROM and similar kits used in the gaming industry, though they have the downside that semi-generic attacking tools also exist to counter them. Malicious software itself can and has been observed using anti-tampering techniques, for example the Mariposa botnet.[10]

See also

References

  1. ^ Michael Konrad Arnold; Martin Schmucker; Stephen D. Wolthusen (1 January 2003). Techniques and Applications of Digital Watermarking and Content Protection. Artech House. pp. 229–. ISBN 978-1-58053-664-6.
  2. ^ a b Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1007/978-3-642-04846-3_9, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1007/978-3-642-04846-3_9 instead.
  3. ^ Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1145/1866870.1866877, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1145/1866870.1866877 instead.
  4. ^ "Keeping the Pirates at Bay". Gamasutra. Retrieved 2013-12-24.
  5. ^ David Chaboya, (20 Jun 2007) State of the Practice of Software Anti-Tamper. Air Force Research Labs Anti-Tamper and Software Protection Initiative (AT-SPI) Technology Office
  6. ^ Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1007/s11416-009-0118-4, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1007/s11416-009-0118-4 instead.
  7. ^ Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1007/10958513_1, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1007/10958513_1 instead.
  8. ^ Steven B. Davis (2008). Protecting Games. Cengage Learning. p. 135. ISBN 1-58450-687-3.
  9. ^ Keller, John. "Anti-tamper technologies seek to keep critical military systems data in the right hands - Military & Aerospace Electronics". Militaryaerospace.com. Retrieved 2013-12-24.
  10. ^ Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1109/CRISIS.2010.5764915, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1109/CRISIS.2010.5764915 instead.