Introducing Code Assets of a New White-Box Security Modeling Language
Title | Introducing Code Assets of a New White-Box Security Modeling Language |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Sun, H., Liu, L., Feng, L., Gu, Y. X. |
Conference Name | 2014 IEEE 38th International Computer Software and Applications Conference Workshops |
Date Published | jul |
Keywords | Analytical models, attacker, binary code, Binary codes, code assets, code security, composability, Computational modeling, Computer crime, Conferences, data protection, i-WBS, Metrics, pubcrawl, resilience, Resiliency, reverse engineer, security, Security modeling language, Software, software protection solutions, software protection technologies, source code (software), specification languages, Testing, WB security analysis, white box, White Box Security, White-box security, white-box security modeling language |
Abstract | This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed by a leading provider of software protection technologies and solutions. We provide a part of a new modeling language named i-WBS (White-Box Security) to describe problems of WB security better. The essence of White-Box security problem is code security. We made the new modeling language focus on code more than ever before. In this way, developers who are not security experts can easily understand what they need to really protect. |
DOI | 10.1109/COMPSACW.2014.24 |
Citation Key | sun_introducing_2014 |
- Metrics
- white-box security modeling language
- White-box security
- WB security analysis
- testing
- specification languages
- source code (software)
- software protection technologies
- software protection solutions
- Software
- Security modeling language
- reverse engineer
- Resiliency
- resilience
- pubcrawl
- White Box Security
- i-WBS
- Data protection
- Conferences
- Computer crime
- Computational modeling
- composability
- code security
- code assets
- Binary codes
- binary code
- attacker
- Analytical models
- security
- white box