DocumentCode
888137
Title
Architecture support for 3D obfuscation
Author
Gomathisankaran, Mahadevan ; Tyagi, Akhilesh
Author_Institution
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
Volume
55
Issue
5
fYear
2006
fDate
5/1/2006 12:00:00 AM
Firstpage
497
Lastpage
507
Abstract
Software obfuscation is defined as a transformation of a program P into T(P) such that the whitebox and blackbox behaviors of T(P) are computationally indistinguishable. However, robust obfuscation is impossible to achieve with the existing software only solutions. This results from the power of the adversary model in digital rights management systems, which is significantly more than in the traditional security scenarios. The adversary has complete control of the computing node - supervisory privileges along with the full physical as well as architectural object observational capabilities. In essence, this makes the operating system (or any other layer around the architecture) untrustworthy. Thus, the trust has to be provided by the underlying architecture. In this paper, we develop an architecture to support 3D obfuscation through the use of well-known cryptographic methods and show how it provides copy-protection, IP-protection, and tamper-resistance.
Keywords
copy protection; cryptography; operating systems (computers); software architecture; 3D obfuscation; IP-protection; copy-protection; cryptographic method; digital rights management system; operating system; program transformation; software obfuscation; Computer architecture; Computer crime; Cryptography; Hardware; Operating systems; Physics computing; Power system management; Power system protection; Power system security; Robustness; Obfuscation; digital rights management; secure systems architecture.;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2006.68
Filename
1613831
Link To Document