1990
DOI: 10.1109/32.55090
|View full text |Cite
|
Sign up to set email alerts
|

ABYSS: an architecture for software protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2002
2002
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…We are not contesting this notion we are suggesting that by having a tamper-resistant device that can store applications and execute them within its bounds, can go a step further and provide a secure execution environment that individual applications can utilise for their security sensitive code. The problem with this proposal is that most of the tamper-resistant devices capable of executing applications are under centralised control (as in the smart card industry) [11,32], or they are stripped down to cryptographic services [18,20,21,52,53]. A UCTD avoids such issues while providing an open and dynamic execution environment.…”
Section: Traditional Computing Devicesmentioning
confidence: 99%
“…We are not contesting this notion we are suggesting that by having a tamper-resistant device that can store applications and execute them within its bounds, can go a step further and provide a secure execution environment that individual applications can utilise for their security sensitive code. The problem with this proposal is that most of the tamper-resistant devices capable of executing applications are under centralised control (as in the smart card industry) [11,32], or they are stripped down to cryptographic services [18,20,21,52,53]. A UCTD avoids such issues while providing an open and dynamic execution environment.…”
Section: Traditional Computing Devicesmentioning
confidence: 99%
“…One hardware solution is the use of secure coprocessors (or processors) [18,19,15]. In secure coprocessors, programs or portions of them can be run encrypted, so their code is never revealed in untrusted memory.…”
Section: Related Workmentioning
confidence: 99%
“…Attribute certificates bind customer identities with certain content access rights or privileges. In the tradition of [WC87], a user's access privilege list for a given title is called his or her right-to-execute (RTE). The RTE may specify unlimited usage (such as in the purchase of a title) or limitedtime usage (such as in the rental of a title).…”
Section: Privilege Management Infrastructure (Pmi)mentioning
confidence: 99%