{"title":"利用人工神经网络设计针对逆向工程的软件锁定机制","authors":"C. Lungu, R. Potolea","doi":"10.1109/ICCP.2012.6356165","DOIUrl":null,"url":null,"abstract":"Protection of intellectual property against unwanted tampering is a pressing issue to many content providers. Access to sensitive information typically takes the form of copyright violations. To address this issue, owners typically employ different protection mechanisms. Many are weak (e.g., they have single points of failure), rendering them vulnerable to static analysis. Others are expensive to implement (e.g., they induce large performance penalties). In this paper we present a new method of protecting copyrighted material by using a locking mechanism based on artificial neural networks (ANN). Understanding the operation of a ANN is difficult as the knowledge is embedded in a complex, distributed, and sometimes self-contradictory form. The security of our system is based on replacing the decryption function of the protected information with a semantically equivalent artificial neural network. We designed the system so as to eliminate single points of failure and allow for retroactive key generations for the same protected material. This allows a many-to-one relationship between the keys and the encryption. The protection offered by our mechanism is resilient to reverse engineering and static analysis. We also describe a methodology for creating these types of locking mechanisms and also evaluate the proposed system based on several properties.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Designing software locking mechanisms against reverse engineering, using artificial neural networks\",\"authors\":\"C. Lungu, R. Potolea\",\"doi\":\"10.1109/ICCP.2012.6356165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protection of intellectual property against unwanted tampering is a pressing issue to many content providers. Access to sensitive information typically takes the form of copyright violations. To address this issue, owners typically employ different protection mechanisms. Many are weak (e.g., they have single points of failure), rendering them vulnerable to static analysis. Others are expensive to implement (e.g., they induce large performance penalties). In this paper we present a new method of protecting copyrighted material by using a locking mechanism based on artificial neural networks (ANN). Understanding the operation of a ANN is difficult as the knowledge is embedded in a complex, distributed, and sometimes self-contradictory form. The security of our system is based on replacing the decryption function of the protected information with a semantically equivalent artificial neural network. We designed the system so as to eliminate single points of failure and allow for retroactive key generations for the same protected material. This allows a many-to-one relationship between the keys and the encryption. The protection offered by our mechanism is resilient to reverse engineering and static analysis. We also describe a methodology for creating these types of locking mechanisms and also evaluate the proposed system based on several properties.\",\"PeriodicalId\":406461,\"journal\":{\"name\":\"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCP.2012.6356165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCP.2012.6356165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Designing software locking mechanisms against reverse engineering, using artificial neural networks
Protection of intellectual property against unwanted tampering is a pressing issue to many content providers. Access to sensitive information typically takes the form of copyright violations. To address this issue, owners typically employ different protection mechanisms. Many are weak (e.g., they have single points of failure), rendering them vulnerable to static analysis. Others are expensive to implement (e.g., they induce large performance penalties). In this paper we present a new method of protecting copyrighted material by using a locking mechanism based on artificial neural networks (ANN). Understanding the operation of a ANN is difficult as the knowledge is embedded in a complex, distributed, and sometimes self-contradictory form. The security of our system is based on replacing the decryption function of the protected information with a semantically equivalent artificial neural network. We designed the system so as to eliminate single points of failure and allow for retroactive key generations for the same protected material. This allows a many-to-one relationship between the keys and the encryption. The protection offered by our mechanism is resilient to reverse engineering and static analysis. We also describe a methodology for creating these types of locking mechanisms and also evaluate the proposed system based on several properties.