Developing Anti-tamper Functionalities through Continuous Integration

Anti-tamper is the security engineering activity that frustrates or prevents the reverse-engineering or modification of the computing devices. As the number of advanced computing devices such as autonomous vehicles and robots increases, the necessity of anti-tamper functionality is also increasing so that sensitive information or intellectual property stored in the devices are not leaked by reverse engineering. In this paper, we study a continuous integration development environment that can effectively apply anti-tamper functionality during the development of computing device. Proposed anti-tamper automation in continuous integration development environment can reduce development cost and time burden by eliminating manual anti-tamper implementation activity.

[1]  Jari-Matti Mäkelä,et al.  Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..

[2]  Maya Gokhale,et al.  Trident: From High-Level Language to Hardware Circuitry , 2007, Computer.

[3]  Keith D. Underwood,et al.  FPGAs vs. CPUs: trends in peak floating-point performance , 2004, FPGA '04.

[4]  P. Sojan Lal,et al.  JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes , 2009, COMPUTE '09.

[5]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[6]  Yeonseung Ryu,et al.  A FPGA-Based Scheme for Protecting Weapon System Software Technology , 2018, ICCSA.

[7]  Arthur F Huber,et al.  The Role and Nature of Anti-Tamper Techniques in U.S. Defense Acquisition , 1999 .

[8]  Yang Le,et al.  Research on Java Bytecode Parse and Obfuscate Tool , 2012, 2012 International Conference on Computer Science and Service System.

[9]  Atsuko Miyaji,et al.  Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[10]  Fei Hu,et al.  Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations , 2016 .

[11]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[12]  Louise H. Crockett,et al.  The Zynq Book: Embedded Processing with the Arm Cortex-A9 on the Xilinx Zynq-7000 All Programmable Soc , 2014 .

[13]  Pong P. Chu FPGA prototyping by VHDL examples , 2008 .