Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection

03/27/2023
by   Cataldo Basile, et al.
0

The last years have seen an increase in Man-at-the-End (MATE) attacks against software applications, both in number and severity. However, software protection, which aims at mitigating MATE attacks, is dominated by fuzzy concepts and security-through-obscurity. This paper presents a rationale for adopting and standardizing the protection of software as a risk management process according to the NIST SP800-39 approach. We examine the relevant constructs, models, and methods needed for formalizing and automating the activities in this process in the context of MATE software protection. We highlight the open issues that the research community still has to address. We discuss the benefits that such an approach can bring to all stakeholders. In addition, we present a Proof of Concept (PoC) decision support system that instantiates many of the discussed construct, models, and methods and automates many activities in the risk analysis methodology for the protection of software. Despite being a prototype, the PoC's validation with industry experts indicated that several aspects of the proposed risk management process can already be formalized and automated with our existing toolbox and that it can actually assist decision-making in industrially relevant settings.

READ FULL TEXT
research
11/14/2020

Software Protection as a Risk Analysis Process

The last years have seen an increase of Man-at-the-End (MATE) attacks ag...
research
01/15/2022

Chatbot Based Solution for Supporting Software Incident Management Process

A set of steps for implementing a chatbot, to support decision-making ac...
research
03/02/2020

Code Renewability for Native Software Protection

Software protection aims at safeguarding assets embedded in software by ...
research
10/13/2022

Forensic-Ready Risk Management Concepts

Currently, numerous approaches exist supporting the implementation of fo...
research
05/06/2023

We Are Not There Yet: The Implications of Insufficient Knowledge Management for Organisational Compliance

Since GDPR went into effect in 2018, many other data protection and priv...
research
03/22/2020

Annotation-Based Static Analysis for Personal Data Protection

This paper elaborates the use of static source code analysis in the cont...
research
12/23/2020

Flexible Software Protection

To counter software reverse engineering or tampering, software obfuscati...

Please sign up or login with your details

Forgot password? Click here to reset