Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Tamper resistant software: an implementation

  • Conference paper
  • First Online:
Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described.

The architecture consists of segment of code, called an Integrity Verification Kernel, which is self-modifying, self-decrypting, and installation unique. This code segment communicates with other such code segments to create an Interlocking Trust model.

The paper concludes with speculation of additional uses of the developed technology and an evaluation of the technology's effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Rivest, R., Shamir, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Crypotsystems. Communications of the ACM, vol. 21, issue 2, Feb. 1978, pp. 120–126.

    Article  Google Scholar 

  2. Kocher, P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks. Private Extended Abstract, 7 December 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aucsmith, D. (1996). Tamper resistant software: an implementation. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_49

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_49

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics