Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of this approach to software tamper resistance include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability to integrate code protection mechanisms automatically. In this paper, we show that the rich functionality of most modern general-purpose processors (including UltraSparc, x86, PowerPC, AMD64, Alpha, and ARM) facilitate an automated, generic attack which defeats such self-hashing. We present a general description of the attack strategy and multiple attack implementations that exploit different processor features. Each of these implementations is generic in tha...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Software self-checksumming is widely used as an anti-tam-pering mechanism for protecting intellectua...
Abstract. We describe a novel software verification primitive called Oblivious Hashing. Unlike previ...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Self-healing systems can restore their original functionality by use of run-time self-reconfiguratio...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
. There has been considerable recent interest in the level of tamper resistance that can be provided...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...
Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Software self-checksumming is widely used as an anti-tam-pering mechanism for protecting intellectua...
Abstract. We describe a novel software verification primitive called Oblivious Hashing. Unlike previ...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Self-healing systems can restore their original functionality by use of run-time self-reconfiguratio...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
. There has been considerable recent interest in the level of tamper resistance that can be provided...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
This paper presents a novel hardware attack against RSA-based authentication of programs. Like the s...