An Approach for Safe and Secure Software Protection Supported by Symbolic Execution

πŸ“… 2026-03-11
πŸ›οΈ DEXA Workshops
πŸ“ˆ Citations: 1
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This work addresses the security risks associated with executing industrial control software on unauthorized hardware, a challenge inadequately mitigated by conventional protection mechanisms that often fail to balance security and functional correctness. The authors propose a novel hardware-software binding approach that integrates Physical Unclonable Functions (PUFs) with symbolic execution to enforce program behavior constraints and verify critical security properties. This method ensures that the software operates correctly only on authorized target devices while maintaining secure behaviorβ€”even in the presence of unauthorized execution environments or PUF failures. Notably, this study is the first to leverage symbolic execution for preserving software security properties under anomalous execution conditions, thereby achieving a robust combination of strong anti-reverse-engineering capabilities and high reliability.

Technology Category

Application Category

πŸ“ Abstract
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
Problem

Research questions and friction points this paper is trying to address.

software protection
industrial control software
Physically Unclonable Functions
safety properties
reverse engineering
Innovation

Methods, ideas, or system contributions that make the work stand out.

Physically Unclonable Functions
symbolic execution
software copy protection
hardware-software binding
safety preservation
πŸ”Ž Similar Papers
No similar papers found.
D
Daniel Dorfmeister
Software Competence Center Hagenberg, Austria
Flavio Ferrarotti
Flavio Ferrarotti
Software Competence Center Hagenberg GmbH
finite model theorydescriptive complexityformal modelsdatabase theorybehavioural theory of algorithms
B
Bernhard Fischer
Software Competence Center Hagenberg, Austria
E
Evelyn Haslinger
Symflower GmbH, Linz, Austria
Rudolf Ramler
Rudolf Ramler
Software Competence Center Hagenberg GmbH (SCCH)
Software TestingSoftware QualitySoftware Analytics
M
Markus Zimmermann
Symflower GmbH, Linz, Austria