Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have been promoted as an alternative to other software integrity verification techniques. Ap-pealing aspects include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability to automatically integrate check-summing code during program compilation or linking. In this paper, we show that the rich functionality of many modern processors, including UltraSparc and x86-compatible processors, facilitates automated attacks which defeat such checksumming by self-checking programs.
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems ...
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Software self-checksumming is widely used as an anti-tam-pering mechanism for protecting intellectua...
Abstract. Common software-protection systems attempt to detect ma-licious observation and modificati...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
A major challenge in software protection is the problem of tampering where an adversary modifies a p...
In software protection we typically have to deal with the white-box attack model. In this model an a...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems ...
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Software self-checksumming is widely used as an anti-tam-pering mechanism for protecting intellectua...
Abstract. Common software-protection systems attempt to detect ma-licious observation and modificati...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
A major challenge in software protection is the problem of tampering where an adversary modifies a p...
In software protection we typically have to deal with the white-box attack model. In this model an a...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...