메뉴 건너뛰기




Volumn , Issue , 2007, Pages 129-140

Towards integral binary execution: Implementing oblivious hashing using overlapped instruction encodings

Author keywords

Anti disassembly; Integrity checking; Obfuscation; Oblivious hashing; Overlapped code; Tamper resistance

Indexed keywords

ANTI-DISASSEMBLY; INTEGRITY CHECKING; OBFUSCATION; OBLIVIOUS HASHING; OVERLAPPED CODE; TAMPER-RESISTANCE;

EID: 38849121919     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1288869.1288887     Document Type: Conference Paper
Times cited : (33)

References (48)
  • 1
    • 38849130111 scopus 로고    scopus 로고
    • Cloakware. http://www.cloakware.com.
    • Cloakware
  • 2
    • 38849123652 scopus 로고    scopus 로고
    • Dotfuscator. http://www.preemptive.com/products/ dotfuscator.
    • Dotfuscator
  • 3
    • 38849124976 scopus 로고    scopus 로고
    • Safedisc. http://www.macrovision.com/products/ safedisc.
    • Safedisc
  • 4
    • 38849173181 scopus 로고    scopus 로고
    • SpecCPU benchmark
    • SpecCPU benchmark, http://www.spec.org.
  • 8
    • 0012038522 scopus 로고    scopus 로고
    • Tamper-resistant software: An implementation
    • D. Aucsmith. Tamper-resistant software: An implementation. In Information Hiding, 1996.
    • (1996) Information Hiding
    • Aucsmith, D.1
  • 11
    • 0003130498 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • D. Boneh and R. Lipton. On the importance of checking cryptographic protocols for faults. In Eurocrypt 1997.
    • Eurocrypt 1997
    • Boneh, D.1    Lipton, R.2
  • 19
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of executable code to improve resistance to static disassembly
    • S. Debray and C. Linn. Obfuscation of executable code to improve resistance to static disassembly. In CCS 2003.
    • CCS 2003
    • Debray, S.1    Linn, C.2
  • 21
    • 0042349623 scopus 로고    scopus 로고
    • P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
    • P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
  • 24
    • 38849130752 scopus 로고    scopus 로고
    • Personal communication
    • W. H. Gates. Personal communication.
    • Gates, W.H.1
  • 28
    • 38849092676 scopus 로고    scopus 로고
    • Attacking an obfuscated cipher by injecting faults
    • M. Jacob, D. Boneh, and E. Felten. Attacking an obfuscated cipher by injecting faults. In ACM DRM 2002.
    • ACM DRM 2002
    • Jacob, M.1    Boneh, D.2    Felten, E.3
  • 29
    • 38849095349 scopus 로고    scopus 로고
    • Protecting digital goods using oblivious checking,
    • US Patent No. 7,080,257, filed on Aug. 30, 2000, granted on July 18, 2006
    • M. H. Jakubowski and R. Venkatesan. Protecting digital goods using oblivious checking, US Patent No. 7,080,257, filed on Aug. 30, 2000, granted on July 18, 2006.
    • Jakubowski, M.H.1    Venkatesan, R.2
  • 30
    • 0001297528 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Crypto 1996.
    • Crypto 1996
    • Kocher, P.1
  • 38
    • 67650815913 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of AES. In CT-RSA 2006.
    • CT-RSA 2006
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 39
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP 2005.
    • SOSP 2005
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doom, L.5    Khosla, P.6
  • 42
    • 0004349103 scopus 로고    scopus 로고
    • Vulcan - binary transformation in a distributed environment
    • Technical Report MSR-TR-2001-50, MSR
    • A. Srivastava, A. Edwards, and H. Vo. Vulcan - binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, MSR, 2001.
    • (2001)
    • Srivastava, A.1    Edwards, A.2    Vo, H.3
  • 45
    • 0012037951 scopus 로고    scopus 로고
    • Software tamper resistance: Obstructing static analysis of programs
    • Technical Report CS-2000-12, University of Virginia, Dec
    • C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia, Dec. 2000.
    • (2000)
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4
  • 46
    • 33745541383 scopus 로고    scopus 로고
    • On obfuscating point functions
    • H. Wee. On obfuscating point functions. In STOC 2005.
    • STOC 2005
    • Wee, H.1
  • 48
    • 12844260675 scopus 로고    scopus 로고
    • Hide: An infrastructure for efficiently protecting information leakage on the address bus
    • X. Zhuang, T. Zhang, and S. Pande. Hide: An infrastructure for efficiently protecting information leakage on the address bus. In ASPLOS-XI.
    • ASPLOS-XI
    • Zhuang, X.1    Zhang, T.2    Pande, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.