Secure and efficient code encryption scheme based on indexed table

Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, Seungjoo Kim

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.

Original languageEnglish
Pages (from-to)60-70
Number of pages11
JournalETRI Journal
Volume33
Issue number1
DOIs
Publication statusPublished - 2011 Feb
Externally publishedYes

Keywords

  • Code encryption
  • Reverse engineering
  • Software protection
  • Tamper resistance

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Secure and efficient code encryption scheme based on indexed table'. Together they form a unique fingerprint.

  • Cite this