(B)LOCKBOX -- Secure Software Architecture with Blockchain Verification

Erik Heiland,Peter Hillmann
DOI: https://doi.org/10.48550/arXiv.2211.11444
2022-11-21
Abstract:According to experts, one third of all IT vulnerabilities today are due to inadequate software verification. Internal program processes are not sufficiently secured against manipulation by attackers, especially if access has been gained. There is a lack of internal control instances that can monitor and control program flows. Especially when a software vulnerability becomes known, quick action is required, whereby the consequences for an individual application are often not foreseeable. With our approach (B)LOCKBOX, software building blocks act as verified entities within a transaction-based blockchain network. Source Code, binaries and application execution become supervised. Unwanted interference and manipulation are prevented by the integrity of the distributed system.
Cryptography and Security,Distributed, Parallel, and Cluster Computing,Systems and Control
What problem does this paper attempt to address?