Code protection for resource-constrained embedded devices

H. Saputra, G. Chen, R. Brooks, Vijaykrishnan Narayanan, Mahmut Kandemir, Mary Jane Irwin

Research output: Contribution to conferencePaper

2 Citations (Scopus)

Abstract

While the machine neutral Java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are several tools to reverse engineer Java bytecodes. The focus of this work is the design of a substitution-based bytecode obruscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various Java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.

Original languageEnglish (US)
Pages240-248
Number of pages9
StatePublished - Sep 29 2004
EventProceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04) - Washington, DC, United States
Duration: Jun 11 2004Jun 13 2004

Other

OtherProceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04)
CountryUnited States
CityWashington, DC
Period6/11/046/13/04

Fingerprint

Substitution reactions
Cryptography
Engineers
Experiments

All Science Journal Classification (ASJC) codes

  • Software

Cite this

Saputra, H., Chen, G., Brooks, R., Narayanan, V., Kandemir, M., & Irwin, M. J. (2004). Code protection for resource-constrained embedded devices. 240-248. Paper presented at Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, United States.
Saputra, H. ; Chen, G. ; Brooks, R. ; Narayanan, Vijaykrishnan ; Kandemir, Mahmut ; Irwin, Mary Jane. / Code protection for resource-constrained embedded devices. Paper presented at Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, United States.9 p.
@conference{1214cf4c7e1a4dd786add11867d0d93f,
title = "Code protection for resource-constrained embedded devices",
abstract = "While the machine neutral Java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are several tools to reverse engineer Java bytecodes. The focus of this work is the design of a substitution-based bytecode obruscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various Java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.",
author = "H. Saputra and G. Chen and R. Brooks and Vijaykrishnan Narayanan and Mahmut Kandemir and Irwin, {Mary Jane}",
year = "2004",
month = "9",
day = "29",
language = "English (US)",
pages = "240--248",
note = "Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04) ; Conference date: 11-06-2004 Through 13-06-2004",

}

Saputra, H, Chen, G, Brooks, R, Narayanan, V, Kandemir, M & Irwin, MJ 2004, 'Code protection for resource-constrained embedded devices', Paper presented at Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, United States, 6/11/04 - 6/13/04 pp. 240-248.

Code protection for resource-constrained embedded devices. / Saputra, H.; Chen, G.; Brooks, R.; Narayanan, Vijaykrishnan; Kandemir, Mahmut; Irwin, Mary Jane.

2004. 240-248 Paper presented at Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, United States.

Research output: Contribution to conferencePaper

TY - CONF

T1 - Code protection for resource-constrained embedded devices

AU - Saputra, H.

AU - Chen, G.

AU - Brooks, R.

AU - Narayanan, Vijaykrishnan

AU - Kandemir, Mahmut

AU - Irwin, Mary Jane

PY - 2004/9/29

Y1 - 2004/9/29

N2 - While the machine neutral Java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are several tools to reverse engineer Java bytecodes. The focus of this work is the design of a substitution-based bytecode obruscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various Java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.

AB - While the machine neutral Java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are several tools to reverse engineer Java bytecodes. The focus of this work is the design of a substitution-based bytecode obruscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various Java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.

UR - http://www.scopus.com/inward/record.url?scp=4544268387&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=4544268387&partnerID=8YFLogxK

M3 - Paper

AN - SCOPUS:4544268387

SP - 240

EP - 248

ER -

Saputra H, Chen G, Brooks R, Narayanan V, Kandemir M, Irwin MJ. Code protection for resource-constrained embedded devices. 2004. Paper presented at Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, United States.