-
1
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
June
-
G.E.Suh and S.Devadas.Physical Unclonable Functions for Device Authentication and Secret Key Generation.In Proceedings of Design Automation Conference, June 2007.
-
(2007)
Proceedings of Design Automation Conference
-
-
Suh, G.E.1
Devadas, S.2
-
2
-
-
70449406215
-
-
https://www.trustedcomputinggroup.orgjhome
-
-
-
-
4
-
-
70449420849
-
-
N.Ferguson, B.Schneier.Practical Cryptography.Wiley Publishing Inc
-
N.Ferguson, B.Schneier.Practical Cryptography.Wiley Publishing Inc.
-
-
-
-
5
-
-
70449423616
-
-
Wheeler, D., Needham, R.: TEA extensions.Technical report, Cambridge University, England (October 1997).
-
Wheeler, D., Needham, R.: TEA extensions.Technical report, Cambridge University, England (October 1997).
-
-
-
-
7
-
-
70449454759
-
-
Xilinx Embedded Systems Tool Reference Manual
-
Xilinx Embedded Systems Tool Reference Manual.
-
-
-
-
8
-
-
70449406214
-
-
R.Anderson and M.Kuhn.Tamper Resistance-A Cautionary Note.InProceedings of 2nd USENIX Workshop on Electronic Commerce, November 1996.
-
R.Anderson and M.Kuhn.Tamper Resistance-A Cautionary Note.InProceedings of 2nd USENIX Workshop on Electronic Commerce, November 1996.
-
-
-
-
9
-
-
27244445173
-
Semi-Invasive Attacks-A New Approach to Hardware Security Analysis
-
UCAM-CL-TR-630.University of Cambridge
-
S.P.Skorobogatov.Semi-Invasive Attacks-A New Approach to Hardware Security Analysis.In Technical Report UCAM-CL-TR-630.University of Cambridge
-
In Technical Report
-
-
Skorobogatov, S.P.1
-
11
-
-
70449423615
-
-
Xilinx.Inc., Using bitstream encryption, Handbook of the Virtex II Platform.[Online].Available: http://www.xilinx.com
-
Xilinx.Inc., Using bitstream encryption," Handbook of the Virtex II Platform.[Online].Available: http://www.xilinx.com
-
-
-
-
12
-
-
70449439719
-
-
J.Guajardo, S.S.Kumar, G.-1.Schrijen and P.Tuyls, FPGA intrinsic PUFs and their use for IP protection.In Cryptographic Hardware and Embedded Systems, 2007.
-
J.Guajardo, S.S.Kumar, G.-1.Schrijen and P.Tuyls, FPGA intrinsic PUFs and their use for IP protection.In Cryptographic Hardware and Embedded Systems, 2007.
-
-
-
-
15
-
-
70349252061
-
-
Atallah, M.1., Bryant, E.D., Korb, 1.T., and Rice, 1.R.2008.Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.In Proceedings of the 1st ACM Workshop on Virtual Machine Security (Alexandria, Virginia, USA, October 27-27, 2008).VMSec '08.ACM, New York, NY, 45-48.
-
Atallah, M.1., Bryant, E.D., Korb, 1.T., and Rice, 1.R.2008.Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.In Proceedings of the 1st ACM Workshop on Virtual Machine Security (Alexandria, Virginia, USA, October 27-27, 2008).VMSec '08.ACM, New York, NY, 45-48.
-
-
-
-
16
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-tools for software protection
-
Aug
-
Collberg, C.S.; Thomborson, C., Watermarking, tamper-proofing, and obfuscation-tools for software protection.In Software Engineering, IEEE Transactions on, vo1.28, no.8, pp.735-746, Aug 2002
-
(2002)
Software Engineering, IEEE Transactions on, vo1.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
17
-
-
84959055142
-
Dynamic SelfChecking Techniques for Improved Tamper Resistance.In Security and Privacy in Digital Rights Management
-
B.Home, L.Matheson, C.Sheehan, and R.E.Tarjan, Dynamic SelfChecking Techniques for Improved Tamper Resistance.In Security and Privacy in Digital Rights Management, LNCS, 2320:141-159, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 141-159
-
-
Home, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.E.4
-
18
-
-
84959058990
-
Protecting software code by guards.In Security and Privacy in Digital Rights Management
-
H.Chang, M.Atallah.Protecting software code by guards.In Security and Privacy in Digital Rights Management, LNCS, 2320: 160-175, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 160-175
-
-
Chang, H.1
Atallah, M.2
-
19
-
-
33645998409
-
G.Myles, and 1.Lotspiech, Towards Better Software Tamper Resistance
-
ISC
-
H.Jin, G.Myles, and 1.Lotspiech, Towards Better Software Tamper Resistance.In ISC 2005, LNCS 3650, pp.417--430,2005.
-
(2005)
LNCS
, vol.3650
, pp. 417-430
-
-
Jin, H.1
-
20
-
-
61649084032
-
-
Xuesong Zhang; Fengling He; Wanli Zuo, Hash Function Based Software Watermarking.In Advanced Software Engineering and Its Applications, 2008.ASEA 2008 , no., pp.95-98, 13-15 Dec.2008
-
Xuesong Zhang; Fengling He; Wanli Zuo, Hash Function Based Software Watermarking.In Advanced Software Engineering and Its Applications, 2008.ASEA 2008 , vol., no., pp.95-98, 13-15 Dec.2008
-
-
-
-
21
-
-
84949509764
-
-
Palsberg, J.; Krishnaswamy, S.; Minseok Kwon; Ma, D.; Qiuyun Shao; Zhang, Y., Experience with software watermarking.In Computer Security Applications, 2000.ACSAC '00.16th Annual Conference , no., pp.308-316, Dec 2000
-
Palsberg, J.; Krishnaswamy, S.; Minseok Kwon; Ma, D.; Qiuyun Shao; Zhang, Y., Experience with software watermarking.In Computer Security Applications, 2000.ACSAC '00.16th Annual Conference , vol., no., pp.308-316, Dec 2000
-
-
-
-
22
-
-
33745828710
-
-
Ge, J., Chaudhuri, S., and Tyagi, A.2005.Control flow based obfuscation.In Proceedings of the 5th ACM Workshop on Digital Rights Management (Alexandria, VA, USA, November 07-07, 2005).DRM '05.ACM, New York, NY, 83-92.
-
Ge, J., Chaudhuri, S., and Tyagi, A.2005.Control flow based obfuscation.In Proceedings of the 5th ACM Workshop on Digital Rights Management (Alexandria, VA, USA, November 07-07, 2005).DRM '05.ACM, New York, NY, 83-92.
-
-
-
-
23
-
-
77249090126
-
-
Michiels, W.and Gorissen, P.2007.Mechanism for software tamper resistance: an application of white-box cryptography.In Proceedings of the 2007 ACM Workshop on Digital Rights Management (Alexandria, Virginia, USA, October 29-29, 2007).DRM '07.ACM, New York, NY, 82-89.
-
Michiels, W.and Gorissen, P.2007.Mechanism for software tamper resistance: an application of white-box cryptography.In Proceedings of the 2007 ACM Workshop on Digital Rights Management (Alexandria, Virginia, USA, October 29-29, 2007).DRM '07.ACM, New York, NY, 82-89.
-
-
-
-
24
-
-
24344453452
-
-
P.Van Oorschot, A.Somayaji, G.Wurster, Hardware-assisted circumvention of self-hashing software tamper resistance, In IEEE Trans on dependable and secure computing.2(2):82-92, April-June 2005.
-
P.Van Oorschot, A.Somayaji, G.Wurster, Hardware-assisted circumvention of self-hashing software tamper resistance, In IEEE Trans on dependable and secure computing.2(2):82-92, April-June 2005.
-
-
-
-
25
-
-
1142280988
-
-
Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S.2003.AEGIS: architecture for tamper-evident and tamper-resistant processing.In Proceedings of the 17th Annual international Conference on Supercomputing (San Francisco, CA, USA, June 23-26,2003).ICS '03.ACM, New York, NY, 160-171.
-
Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S.2003.AEGIS: architecture for tamper-evident and tamper-resistant processing.In Proceedings of the 17th Annual international Conference on Supercomputing (San Francisco, CA, USA, June 23-26,2003).ICS '03.ACM, New York, NY, 160-171.
-
-
-
|