We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
%0 Conference Paper
%1 10.1007/978-3-031-39689-2_7
%A Dorfmeister, Daniel
%A Ferrarotti, Flavio
%A Fischer, Bernhard
%A Haslinger, Evelyn
%A Ramler, Rudolf
%A Zimmermann, Markus
%B Database and Expert Systems Applications - DEXA 2023 Workshops
%C Cham
%D 2023
%E Kotsis, Gabriele
%E Tjoa, A. Min
%E Khalil, Ismail
%E Moser, Bernhard
%E Mashkoor, Atif
%E Sametinger, Johannes
%E Khan, Maqbool
%I Springer Nature Switzerland
%K protection safe secure software symbolyc
%P 67--78
%T An Approach for Safe and Secure Software Protection Supported by Symbolic Execution
%U https://link.springer.com/chapter/10.1007/978-3-031-39689-2_7
%X We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
%@ 978-3-031-39689-2
@inproceedings{10.1007/978-3-031-39689-2_7,
abstract = {We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.},
added-at = {2024-03-27T10:40:59.000+0100},
address = {Cham},
author = {Dorfmeister, Daniel and Ferrarotti, Flavio and Fischer, Bernhard and Haslinger, Evelyn and Ramler, Rudolf and Zimmermann, Markus},
biburl = {https://www.bibsonomy.org/bibtex/29c42cb7f7845b8523e52f3f849a4cb73/scch},
booktitle = {Database and Expert Systems Applications - DEXA 2023 Workshops},
editor = {Kotsis, Gabriele and Tjoa, A. Min and Khalil, Ismail and Moser, Bernhard and Mashkoor, Atif and Sametinger, Johannes and Khan, Maqbool},
interhash = {7355aeb68703885070f13ca58725442b},
intrahash = {9c42cb7f7845b8523e52f3f849a4cb73},
isbn = {978-3-031-39689-2},
keywords = {protection safe secure software symbolyc},
pages = {67--78},
publisher = {Springer Nature Switzerland},
timestamp = {2024-03-27T10:40:59.000+0100},
title = {An Approach for Safe and Secure Software Protection Supported by Symbolic Execution},
url = {https://link.springer.com/chapter/10.1007/978-3-031-39689-2_7},
year = 2023
}