Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
نویسندگان
چکیده
منابع مشابه
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tamper detection. In this paper we propose a tamper resistance technique which provides both on and offline tamper detection. In our offline approach, the software dynamically detects tamperi...
متن کاملSoftware Tamper Resistance Through Dynamic Program Monitoring
This paper describes a two instruction-stream (twoprocess) model for tamper resistance. One process (Monitor process, M-Process) is designed explicitly to monitor the control flow of the main program process (P-Process). The compilation phase compiles the software into two co-processes: P-process and M-process. The monitor process contains the control flow consistency conditions for the P-proce...
متن کاملSpecifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” model, which gives the abstracted actions available to a single user program. This idealized model is compared to a concrete “actual” model that includes actions of an adversarial operating system. The architecture is verified by using a finite-state enumeration tool (a model checker) to com...
متن کاملTrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware
With scalability, fault tolerance, ease of programming, and flexibility, MapReduce has gained many attractions for large-scale data processing. However, despite its merits, MapReduce does not focus on the problem of data privacy, especially when processing sensitive data, such as personal data, on untrusted infrastructure. In this paper, we investigate a scenario based on the Trusted Cells para...
متن کاملUsing Hardware Assisted Geometric Hashing for High SpeedTarget Acquisition
Geometric hashing provides a reliable and transformation independent representation of a target. The characteri-sation of a target object is obtained by establishing a vector basis relative to a number of interest points unique to the target. The number of basis points required is a function of the dimensionality of the environment in which the technique is being used. This basis is used to enc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2005
ISSN: 0361-1434
DOI: 10.1109/tdsc.2005.24