Code Renewability for Native Software Protection
- Submitting institution
-
University of East London
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 8
- Type
- D - Journal article
- DOI
-
10.1145/3404891
- Title of journal
- ACM Transactions on Privacy and Security
- Article number
- -
- First page
- 1
- Volume
- 23
- Issue
- 4
- ISSN
- 2471-2566
- Open access status
- Compliant
- Month of publication
- -
- Year of publication
- 2020
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
6
- Research group(s)
-
3 - Secure Software Engineering
- Citation count
- 0
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This work describes the ASPIRE toolchain of software protections, developed in the ASPIRE-FP7 European project. Its novel code renewability framework allows dynamic updates of native Android apps to contrast reverse-engineering attacks. The open-source toolchain [1] made many companies independent from the expensive licenses of existing providers. Notably, NAGRA-Kudelski uses it to renew the white-box crypto library of their video-player, deployed on millions of Android devices, while the toolchain has been integrated into The Kudelski Obfuscation Product used for protecting 3rd party Digital TV and IOT products, generating millions of revenues [2].
[1] https://github.com/uel-aspire-fp7/
[2] Brecht Wyseur Senior Product Manager Kudelski
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -