An approach to the objective and quantitative evaluation of tamper-resistant software

Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Citations (Scopus)

Abstract

Tamper-resistant software has been studied as techniques to protect algorithm or secret data. There are many ways to realize tamperresistant software including the method of making software hard to read. So far, no objective and quantitative method is known for evaluating tamper-resistant software. Most of known evaluation methods require involvement of human being. That means their evaluation results deeply depend on the skill and subjectivity of human. Therefore, it has been expected to devise an objective and quantitative evaluation method in place of subjective evaluation methods. In this paper we propose a new such method to measure how hard to read. The basic idea is to use the parse tree of a compiler for a programming language, and evaluate depth and weights of the tree for a code. We give some experimental results to examine its effectiveness.

Original languageEnglish
Title of host publicationInformation Security - 3rd International Workshop, ISW 2000, Proceedings
EditorsJosef Pieprzyk, Jennifer Seberry, Eiji Okamoto
PublisherSpringer Verlag
Pages82-96
Number of pages15
ISBN (Print)3540414169, 9783540414162
DOIs
Publication statusPublished - 2000
Event3rd International Workshop on Information Security, ISW 2000 - Wollongong, Australia
Duration: 2000 Dec 202000 Dec 21

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1975
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Workshop on Information Security, ISW 2000
Country/TerritoryAustralia
CityWollongong
Period00/12/2000/12/21

Fingerprint

Dive into the research topics of 'An approach to the objective and quantitative evaluation of tamper-resistant software'. Together they form a unique fingerprint.

Cite this