Affiliation:
1. Software Engineering Institute
2. Oxford University
3. Vienna University of Technology
Abstract
In many industries, the importance of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers’ source code, and is able to enforce the use of verification tools only by legal requirements. In turn, the supplier has no means to convince the customer about successful verification without revealing the source code. This article presents an approach to resolve the conflict between the IP interests of the supplier and the quality interests of the customer. We introduce a protocol in which a dedicated server (called the “amanat”) is controlled by both parties: the customer controls the verification task performed by the amanat, while the supplier controls the communication channels of the amanat to ensure that the amanat does not leak information about the source code. We argue that the protocol is both practically useful and mathematically sound. As the protocol is based on well-known (and relatively lightweight) cryptographic primitives, it allows a straightforward implementation on top of existing verification tool chains. To substantiate our security claims, we establish the correctness of the protocol by cryptographic reduction proofs.
Funder
Sixth Framework Programme
Deutsche Forschungsgemeinschaft
Predictable Assembly from Certifiable Components (PACC) initiative at the Software Engineering Institute, Pittsburgh, PA
Publisher
Association for Computing Machinery (ACM)
Reference40 articles.
1. AUTOSAR. 2007. Automotive open system architecture (AUTOSAR) Consortium. www.autosar.org. AUTOSAR. 2007. Automotive open system architecture (AUTOSAR) Consortium. www.autosar.org.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Software supply chain security: a systematic literature review;International Journal of Computers and Applications;2024-08-19
2. Secure and trusted partial grey-box verification;International Journal of Information Security;2019-03-27
3. An Amanat-Based Multi-party Certification Protocol for Outsourced Software in Automotive Systems;2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW);2016-10
4. A Compression App for Continuous Probability Distributions;Quantitative Evaluation of Systems;2015