TY - GEN
T1 - An approach to the objective and quantitative evaluation of tamper-resistant software
AU - Goto, Hideaki
AU - Mambo, Masahiro
AU - Matsumura, Kenjiro
AU - Shizuya, Hiroki
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.
PY - 2000
Y1 - 2000
N2 - Tamper-resistant software has been studied as techniques to protect algorithm or secret data. There are many ways to realize tamperresistant software including the method of making software hard to read. So far, no objective and quantitative method is known for evaluating tamper-resistant software. Most of known evaluation methods require involvement of human being. That means their evaluation results deeply depend on the skill and subjectivity of human. Therefore, it has been expected to devise an objective and quantitative evaluation method in place of subjective evaluation methods. In this paper we propose a new such method to measure how hard to read. The basic idea is to use the parse tree of a compiler for a programming language, and evaluate depth and weights of the tree for a code. We give some experimental results to examine its effectiveness.
AB - Tamper-resistant software has been studied as techniques to protect algorithm or secret data. There are many ways to realize tamperresistant software including the method of making software hard to read. So far, no objective and quantitative method is known for evaluating tamper-resistant software. Most of known evaluation methods require involvement of human being. That means their evaluation results deeply depend on the skill and subjectivity of human. Therefore, it has been expected to devise an objective and quantitative evaluation method in place of subjective evaluation methods. In this paper we propose a new such method to measure how hard to read. The basic idea is to use the parse tree of a compiler for a programming language, and evaluate depth and weights of the tree for a code. We give some experimental results to examine its effectiveness.
UR - http://www.scopus.com/inward/record.url?scp=84944220914&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84944220914&partnerID=8YFLogxK
U2 - 10.1007/3-540-44456-4_7
DO - 10.1007/3-540-44456-4_7
M3 - Conference contribution
AN - SCOPUS:84944220914
SN - 3540414169
SN - 9783540414162
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 82
EP - 96
BT - Information Security - 3rd International Workshop, ISW 2000, Proceedings
A2 - Pieprzyk, Josef
A2 - Seberry, Jennifer
A2 - Okamoto, Eiji
PB - Springer Verlag
T2 - 3rd International Workshop on Information Security, ISW 2000
Y2 - 20 December 2000 through 21 December 2000
ER -