2000
DOI: 10.21236/ada419599
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Support for Copy and Tamper Resistant Software

Abstract: Although there have been attempts to develop code transformations that yield tamper-resistant software, no reliable software-only methods Jire known. This paper studies the hardware implementation of a form of execute-only memory (XOM) that allows instructions stored in memory to be executed but not otherwise manipulated. To support XOM code we use a machine that supports internal compartments-a process in one compartment cannot read data firom another compartment. All data that leaves the machine is encrypted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
118
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 147 publications
(118 citation statements)
references
References 0 publications
0
118
0
Order By: Relevance
“…It should be noted that there is a vast body of practical research and development on hardware assisted software protection. The available art for hardware-assisted security is based on memory devices such as floppy disks [31], CDROMs [97], modern removable storage media (hard disk, recordable DVD, secure digital memory card), and video playback units [1]: secure processors [50], smart cards [10], and hardware dongles [15], [58], [83]. 1 Many of these schemes are trade secrets, although some are the subject of patent disclosures.…”
Section: Defenses Against Malicious Host Attacksmentioning
confidence: 99%
“…It should be noted that there is a vast body of practical research and development on hardware assisted software protection. The available art for hardware-assisted security is based on memory devices such as floppy disks [31], CDROMs [97], modern removable storage media (hard disk, recordable DVD, secure digital memory card), and video playback units [1]: secure processors [50], smart cards [10], and hardware dongles [15], [58], [83]. 1 Many of these schemes are trade secrets, although some are the subject of patent disclosures.…”
Section: Defenses Against Malicious Host Attacksmentioning
confidence: 99%
“…Several of these focus on providing architectural support for encrypted execution and storage. In [16], the authors introduce the concept of eXecute-Only Memory, or XOM, which provides a mechanism for cryptographic separation of instruction and data-memory space. The prohibitive performance impact of XOM was later improved in [32] by using a "one-time pad" encryption scheme to reduce encryption latencies.…”
Section: Attack Detectionmentioning
confidence: 99%
“…Once rollback takes place, the HPU would identify and decrypt the encrypted instructions so that they can be executed upon rollback and re-execution. Using the HPU as an accelerated encryption engine could also be extended to create an execution environment similar to XOM [16]. Instead of decrypting placeholder instructions upon rollback, the HPU would encrypt the entire instruction space.…”
Section: Heavyweight Protection Unitmentioning
confidence: 99%
“…Among them, regarding software integrity problems, there have been efforts to solve the problems such as XOM [8,26], off-chip memory security solution [45], and secure single chip processors [2,40] from a hardware perspective.…”
Section: Introductionmentioning
confidence: 99%