Tamper Resistance for Software Defined Radio Software

The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR software, its performance requirements, such as stringent real-time constraint, need to be considered. In this paper, we describe a tamper resistance scheme that was designed to thwart the unauthorized tampering of SDR software. This scheme utilizes code encryption and branch functions to obfuscate the target program while enabling the program to satisfy its performance requirements. The scheme employs a technique called the Random Branch Function Call (RBFC), which enables a user to control the tradeoff between integrity checking frequency and the overhead. We have rigorously evaluated the scheme using various performance metrics and quantified the relationship between the end-to-end delay overhead (caused by the tamper resistance scheme) and voice quality in the context of a voice communication network.

[1]  Hongxia Jin,et al.  Towards Better Software Tamper Resistance , 2005, ISC.

[2]  Dan Boneh,et al.  Attacking an Obfuscated Cipher by Injecting Faults , 2002, Digital Rights Management Workshop.

[3]  Paul C. van Oorschot,et al.  A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Saumya K. Debray,et al.  Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.

[5]  Akhilesh Tyagi,et al.  Software Tamper Resistance Through Dynamic Program Monitoring , 2005, DRMTICS.

[6]  Akito Monden,et al.  Tamper-Resistant Software System Based on a Finite State Machine , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[7]  Koen De Bosschere,et al.  Towards Tamper Resistant Code Encryption: Practice and Experience , 2008, ISPEC.

[8]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[9]  Ping Wang,et al.  Tamper Resistant Software Through Dynamic Integrity Checking , 2005 .

[10]  Robert G. Cole,et al.  Voice over IP performance monitoring , 2001, CCRV.

[11]  Jonathon T. Giffin,et al.  Strengthening software self-checksumming via self-modifying code , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[12]  Koen De Bosschere,et al.  DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications , 2002, PACT 2002.

[13]  Robert E. Tarjan,et al.  Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.