Source code protection against unauthorised copying and analysis in IoT devices
dc.contributor.author | Hyla, Tomasz | |
dc.contributor.author | Byczyk, Sebastian | |
dc.date.accessioned | 2022-12-27T19:24:52Z | |
dc.date.available | 2022-12-27T19:24:52Z | |
dc.date.issued | 2023-01-03 | |
dc.description.abstract | One problem for manufacturers of IoT devices is protecting intellectual rights to the software. Unprotected software can easily be copied or analysed and used on other devices. Proving another party that the source code has been illegally copied is difficult. One of the solutions is code obfuscation, i.e., modifying the code, so it works the same way, but its structure is complicated to understand and analyse. The paper presents a solution dedicated to IoT devices that combines code obfuscation techniques and uses the trusted platform module to decrypt part of the data during execution. A dedicated obfuscation method is described. Experiments show that the method increases the time needed to change the code at least several times, and some junior programmers cannot understand an obfuscated code. Test results show almost no similarity between the code in clear form and obfuscated form. The obfuscated code is more complicated but takes slightly longer to execute. | |
dc.format.extent | 9 | |
dc.identifier.doi | 10.24251/HICSS.2023.836 | |
dc.identifier.isbn | 978-0-9981331-6-4 | |
dc.identifier.uri | https://hdl.handle.net/10125/103470 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 56th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Software Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systems | |
dc.subject | code analysis | |
dc.subject | iot device | |
dc.subject | obfuscation | |
dc.subject | reverse engineering | |
dc.subject | source code | |
dc.subject | tpm | |
dc.title | Source code protection against unauthorised copying and analysis in IoT devices | |
dc.type.dcmi | text | |
prism.startingpage | 6895 |
Files
Original bundle
1 - 1 of 1