Secure and efficient code encryption scheme based on indexed table

Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, Seung-Joo Kim

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.

Original languageEnglish
Pages (from-to)60-70
Number of pages11
JournalETRI Journal
Volume33
Issue number1
DOIs
Publication statusPublished - 2011 Feb 1
Externally publishedYes

Fingerprint

Cryptography
Reverse engineering
Binary codes

Keywords

  • Code encryption
  • Reverse engineering
  • Software protection
  • Tamper resistance

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science(all)
  • Electronic, Optical and Magnetic Materials

Cite this

Secure and efficient code encryption scheme based on indexed table. / Cho, Sungkyu; Shin, Donghwi; Jo, Heasuk; Choi, Donghyun; Won, Dongho; Kim, Seung-Joo.

In: ETRI Journal, Vol. 33, No. 1, 01.02.2011, p. 60-70.

Research output: Contribution to journalArticle

Cho, Sungkyu ; Shin, Donghwi ; Jo, Heasuk ; Choi, Donghyun ; Won, Dongho ; Kim, Seung-Joo. / Secure and efficient code encryption scheme based on indexed table. In: ETRI Journal. 2011 ; Vol. 33, No. 1. pp. 60-70.
@article{8c5156d026e541d8a0fbbe00d4f492fb,
title = "Secure and efficient code encryption scheme based on indexed table",
abstract = "Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.",
keywords = "Code encryption, Reverse engineering, Software protection, Tamper resistance",
author = "Sungkyu Cho and Donghwi Shin and Heasuk Jo and Donghyun Choi and Dongho Won and Seung-Joo Kim",
year = "2011",
month = "2",
day = "1",
doi = "10.4218/etrij.11.0110.0056",
language = "English",
volume = "33",
pages = "60--70",
journal = "ETRI Journal",
issn = "1225-6463",
publisher = "ETRI",
number = "1",

}

TY - JOUR

T1 - Secure and efficient code encryption scheme based on indexed table

AU - Cho, Sungkyu

AU - Shin, Donghwi

AU - Jo, Heasuk

AU - Choi, Donghyun

AU - Won, Dongho

AU - Kim, Seung-Joo

PY - 2011/2/1

Y1 - 2011/2/1

N2 - Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.

AB - Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.

KW - Code encryption

KW - Reverse engineering

KW - Software protection

KW - Tamper resistance

UR - http://www.scopus.com/inward/record.url?scp=79951716976&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79951716976&partnerID=8YFLogxK

U2 - 10.4218/etrij.11.0110.0056

DO - 10.4218/etrij.11.0110.0056

M3 - Article

AN - SCOPUS:79951716976

VL - 33

SP - 60

EP - 70

JO - ETRI Journal

JF - ETRI Journal

SN - 1225-6463

IS - 1

ER -