2000
DOI: 10.1145/356989.357005
|View full text |Cite
|
Sign up to set email alerts
|

Architectural support for copy and tamper resistant software

Abstract: Although there have been attempts to develop code transformations that yield tamper-resistant software, no reliable software-only methods Jire known. This paper studies the hardware implementation of a form of execute-only memory (XOM) that allows instructions stored in memory to be executed but not otherwise manipulated. To support XOM code we use a machine that supports internal compartments-a process in one compartment cannot read data firom another compartment. All data that leaves the machine is encrypted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
216
0

Year Published

2003
2003
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 219 publications
(217 citation statements)
references
References 11 publications
1
216
0
Order By: Relevance
“…Some partial results can be found in previous work [43,49,36,45,35,22,46,28,17,31,37,27,19,20,14,48,32,50,40,15,18].…”
Section: Related Workmentioning
confidence: 64%
“…Some partial results can be found in previous work [43,49,36,45,35,22,46,28,17,31,37,27,19,20,14,48,32,50,40,15,18].…”
Section: Related Workmentioning
confidence: 64%
“…Other types of attacks have also been considered by researchers which we briefly discuss next. Work has been carried out to detect tampering of information stored in off-chip memory [7,5]. The hardware cost of detecting tampering is very high.…”
Section: Related Workmentioning
confidence: 99%
“…Most previous secure processors-including Intel TXT [16], eXecute Only Memory (XOM) [17], [18], [19] and Aegis [20], [21]-do not prevent leakage from memory access patterns. Ascend [22] is a recently-proposed secure processor that uses recursive Path ORAM to conceal the memory access pattern.…”
Section: Introductionmentioning
confidence: 99%