2002
DOI: 10.1007/3-540-36415-3_26
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
58
0
1

Year Published

2003
2003
2018
2018

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(59 citation statements)
references
References 9 publications
0
58
0
1
Order By: Relevance
“…However, solutions requiring hardware modification are unpractical for smart cards. Several works proposed to integrate the checks at software level [26,13,16]. Oh et al [26] only checks the destinations of all jumps.…”
Section: Code Securing and Control Flow Securingmentioning
confidence: 99%
See 1 more Smart Citation
“…However, solutions requiring hardware modification are unpractical for smart cards. Several works proposed to integrate the checks at software level [26,13,16]. Oh et al [26] only checks the destinations of all jumps.…”
Section: Code Securing and Control Flow Securingmentioning
confidence: 99%
“…These java card approaches rely on the ability to perform runtime checks during the interpretation of the bytecode. For native programs, it is mandatory to include any software countermeasure inside the code, as proposed in [26,13,16].…”
Section: Code Securing and Control Flow Securingmentioning
confidence: 99%
“…Other related research is oblivious hashing [5], which interweaves hashing instructions with program instructions and which is able to prove to some extent whether a program operated correctly or not.…”
Section: Tamper Resistancementioning
confidence: 99%
“…Chen et al [13] propose oblivious hashing, which involves compile-time code modifications resulting in the computation of a running trace of the execution history of a program. Here a trace is a cumulative hash of the values of a subset of expressions which occur within the normal program execution.…”
Section: Software Tamper Resistancementioning
confidence: 99%