Indirect data representation via offset vectoring: A Code-integrity-driven In-memory Data Regeneration Scheme

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

Abstract

A common problem in software development is how to handle sensitive information required for appropriate process execution, especially when requesting user input like passwords or -phrases for proper encryption is not applicable due to I/O, UI or UX limitations. This often leads to such information being either stored directly in the source code of the application, or as plaintext in a separate file. We therefore propose an experimental scheme for dynamically recovering arbitrary chunks of information based on the integrity of the text-segment of a running process, without the information being easily extractible from either an on-disk binary, memory dump or the memory map of a running process. Implementing an algorithm we call offset vectoring, this method can help dealing with sensitive information and enhancing the resistance against attacks which aim at extracting such data as well as attempts towards modifying an application, e.g. for the purposes of cracking software.

OriginalspracheEnglisch
TitelSECRYPT
Redakteure/-innenMohammad S. Obaidat, Mohammad S. Obaidat, Pierangela Samarati
Herausgeber (Verlag)SciTePress
Seiten333-340
Seitenumfang8
ISBN (elektronisch)9789897583780
DOIs
PublikationsstatusVeröffentlicht - 2019
Veranstaltung16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Prague, Tschechische Republik
Dauer: 26 Jul 201928 Jul 2019

Publikationsreihe

NameICETE 2019 - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Band2

Konferenz

Konferenz16th International Joint Conference on e-Business and Telecommunications, ICETE 2019
Land/GebietTschechische Republik
OrtPrague
Zeitraum26.07.201928.07.2019

Fingerprint

Untersuchen Sie die Forschungsthemen von „Indirect data representation via offset vectoring: A Code-integrity-driven In-memory Data Regeneration Scheme“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren