Neural Networks for White Box Cryptography in Software Protection Systems
Keywords:
software protection, neural network, cryptography, obfuscation, virtual machineAbstract
This research explores the integration of neural networks into software protection mechanisms, focusing on enhancing cryptographic robustness against unlicensed copying and unauthorized access. The primary purpose is to develop a robust method that combines obfuscation and encryption to protect software by binding its activation and operation to specific hardware and user data, thereby preventing unlicensed replication and disassembly. The approach involves generating a unique hash of hardware identifiers, training a neural network on a remote server to produce a bytecode sequence for a virtual machine, and using the network’s weights as an activation code. Key results show that optimal neural network configurations, particularly those with two dense layers and one LSTM layer, achieve 100% accuracy in mapping predefined inputs to specific bytecodes within an average training time of 11 seconds, while generating pseudorandom outputs for all other inputs. Statistical analysis of output distributions reveals high entropy, demonstrating resilience against statistical attacks. The proposed method offers a layered defense against common attack vectors and ensures persistent security throughout the software’s lifecycle.
References
C. Collberg, C. Thomborson, D. Low, A Taxonomy of Obfuscating Transformations, Technical Report, University of Auckland, 1997, 36 p.
S. Chow, P. Eisen, H. Johnson, P.C.V. Oorschot, “White-box cryptography and an AES implementation,” Selected Areas in Cryptography, vol. 2595, Springer, Berlin, Heidelberg, 2003, pp. 250–270. https://doi.org/10.1007/3-540-36492-7_17
R. Rolles, “Unpacking virtualization obfuscators,” WOOT'09: Proceedings of the 3rd USENIX Conference on Offensive Technologies, Montreal, Canada, August 10–14, 2009. Available at: https://www.usenix.org/legacy/event/woot09/tech/full_papers/rolles.pdf
S. Schrittwieser, S. Katzenbeisser, J. Kinder, G. Merzdovnik, E. Weippl, “Protecting software through obfuscation: Can it keep pace with progress in code analysis?” ACM Computing Surveys, vol. 49, issue 1, article 4, pp.1-37, 2016. https://doi.org/10.1145/2886012
H. Fang, Y. Wu, S. Wang, Y. Huang, “Multi-stage binary code obfuscation using improved virtual machine,” Proceedings of the International Conference on Information Security, Xi'an, China, October 26-29, 2011, pp. 168–181. https://doi.org/10.1007/978-3-642-24861-0_12
I. Meraouche, S. Dutta, H. Tan, K. Sakurai, “Neural networks-based cryptography: A survey,” IEEE Access, vol. 9, pp. 124727–124740, 2021. https://doi.org/10.1109/ACCESS.2021.3109635
A. El-Zoghabi, A.H. Yassin, H.H. Hussien, “Survey report on cryptography based on neural network,” International Journal of Emerging Technology and Advanced Engineering, vol. 3, issue 12, pp. 456–462, 2013.
C.K. Chan, C.K. Chan, L.P. Lee, L.M. Cheng, “Encryption system based on neural network,” in: R. Steinmetz, J. Dittman, M. Steinebach (Eds.), Communications and Multimedia Security Issues of the New Century, Springer, 2001, pp. 117–122. https://doi.org/10.1007/978-0-387-35413-2_10
D. Guo, L.M. Cheng, L.L. Cheng, “A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks,” Applied Intelligence, vol. 10, pp. 71–84, 1999. https://doi.org/10.1023/A:1008337631906
N. Liu, D. Guo, “Security analysis of public-key encryption scheme based on neural networks and its implementation,” Proceedings of the 2006 IEEE International Conference on Computational Intelligence and Security, Guangzhou, China, November 3-6, 2006, pp. 1327–1330. https://doi.org/10.1109/ICCIAS.2006.295274
Y. Fu, J. Fu, J. Wei, Encryption and decryption using deep neural network, in: J.-L. Kim (Ed.) Machine Learning and Artificial Intelligence, IOS Press, 2023, pp. 9–15. Available at: https://ebooks.iospress.nl/doi/10.3233/FAIA230762
K. Kumar, S. Tanwar, and S. Kumar, “MANC: A masked autoencoder neural cryptography based encryption scheme for CT scan images,” MethodsX, vol. 12, p. 102738, 2024. https://doi.org/10.1016/j.mex.2024.102738
A. Radhakrishnan, M. Belkin, and C. Uhler, “Overparameterized neural networks implement associative memory,” Proceedings of the National Academy of Sciences, vol. 117, no. 44, pp. 27162-27170, 2020. https://doi.org/10.1073/pnas.2005013117
H. He, Y. Shang, X. Yang, Y. Di, J. Lin, Y. Zhu, W. Zheng, J. Zhao, M. Ji, L. Dong, and N. Deng, “Constructing an associative memory system using spiking neural network,” Frontiers in Neuroscience, vol. 13, article 650, pp.1-15, 2019. https://doi.org/10.3389/fnins.2019.00650
Y. Tay, V. Tran, M. Dehghani, J. Ni, D. Bahri, H. Mehta, Z. Qin, K. Hui, Z. Zhao, J. Gupta, and T. Schuster, “Transformer memory as a differentiable search index,” Advances in Neural Information Processing Systems, vol. 35, pp. 21831-21843, 2022.
I. Kanter, W. Kinzel, “Neural cryptography,” Proceedings of the 9th International Conference on Neural Information Processing, Singapore, November 18-22, 2002, vol.3, pp.1351-1354
T. Godhavari, N. Alamelu, R. Soundararajan, “Cryptography using neural network,” Proceedings of the Annual IEEE India Conference - Indicon, Chennai, India, 11–13 December 2005.
S. Jeong, C. Park, D. Hong, C. Seo, and N. Jho, “Neural cryptography based on generalized tree parity machine for real‐life systems,” Security and Communication Networks, article ID 6680782, pp. 1-12, 2021. https://doi.org/10.1155/2021/6680782
M. Abadi, D.G. Andersen, “Learning to protect communications with adversarial neural cryptography,” arXiv:1610.06918 [cs.CR], pp. 1–15, 2016. https://doi.org/10.48550/arXiv.1610.06918
E.A. Hagras, S. Aldosary, H. Khaled, and T.M. Hassan, “Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application,” Sensors, vol. 23, issue 14, p. 6589, 2023. https://doi.org/10.3390/s23146589
M.C. Wøien, F.O. Catak, M. Kuzlu, and U., Cali, “Neural networks meet elliptic curve cryptography: A novel approach to secure communication,” arXiv:2407.08831 [cs.CR], pp.1-8, 2024. https://doi.org/10.48550/arXiv.2407.08831
E. Volna, M. Kotyrba, V. Kocian, M. Janosek, “Cryptography based on neural network,” Proceedings of the 26th European Conference on Modeling and Simulation, Koblenz, Germany, May 29 – June 1, 2012, pp. 386–391. https://doi.org/10.7148/2012-0386-0391
R.R. Al-Nima, L. Muhanad, S.Q. Hassan, “Data encryption using backpropagation neural network,” IRAQI Academic Scientific Journals, vol. 15, no. 2, pp. 112–117, 2009.
R.A. Zitar, H. Hussain, “Mirroring neural network approach for encryption/decryption of data,” ICIC Express Letters, vol. 13, no. 12, pp. 1057–1064, 2019.
K. Shihab, “A backpropagation neural network for computer network security,” Journal of Computer Science, vol. 2, no. 9, pp. 710–715, 2006. https://doi.org/10.3844/jcssp.2006.710.715
R.K. Munkulu, V. Gnanam, “Neural network-based decryption for random encryption algorithms,” Proceedings of the 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, Hong Kong, China, 20-22 August, IEEE, 2009, pp. 603–605. https://doi.org/10.1109/ICASID.2009.5277002
I.C. Lin, H.H. Ou, and M.S. Hwang, “A user authentication system using back-propagation network,” Neural Computing & Applications, vol. 14, pp. 243-249, 2005. https://doi.org/10.1007/s00521-004-0460-x
G. Van Houdt, C. Mosquera, G. Nápoles, “A review on the long short-term memory model,” Artificial Intelligence Review, vol. 53, no. 8, pp. 5929–5955, 2020. https://doi.org/10.1007/s10462-020-09838-1
Themida - Advanced Windows software protection system. [Online]. Available at: https://www.oreans.com/Themida.php
SafeEngine overview. [Online]. Available at: https://www.safengine.com/en-us/features/overview
Enigma Protector - Software Licensing and Protection System. [Online]. Available at: https://enigmaprotector.com/en/about.html
A. Battistello, L. Castelnovi, T. Chabrier, “Enhanced encodings for white-box designs,” Proceedings of the International Conference on Smart Card Research and Advanced Applications. Cham: Springer International Publishing, 2021. https://doi.org/10.1007/978-3-030-97348-3_14
Y. Yang, Y. Zhai, H. Dong, Y. Zhang, “WAS: improved white-box cryptographic algorithm over AS iteration,” Cybersecurity, vol. 6, issue 1, p. 56, 2023. https://doi.org/10.1186/s42400-023-00192-7
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.