An Approach for Safe and Secure Software Protection Supported by Symbolic Execution

March 11, 2026 ยท Grace Period ยท ๐Ÿ› Database and Expert Systems Applications - DEXA 2023 Workshops. Communications in Computer and Information Science (CCIS), vol 1872, pp. 67-78. Springer, Cham, 2023

โณ Grace Period
This paper is less than 90 days old. We give authors time to release their code before passing judgment.
Authors Daniel Dorfmeister, Flavio Ferrarotti, Bernhard Fischer, Evelyn Haslinger, Rudolf Ramler, Markus Zimmermann arXiv ID 2603.10608 Category cs.CR: Cryptography & Security Citations 0 Venue Database and Expert Systems Applications - DEXA 2023 Workshops. Communications in Computer and Information Science (CCIS), vol 1872, pp. 67-78. Springer, Cham, 2023
Abstract
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Cryptography & Security