Abstract
We show how reflective ASMs can support hardware-software binding, which can be used for copy protection, and we exploit the logic of rASMs to express desirable properties for this application.
The research of the first three authors has been funded by the Student Research Training Program of Zhejiang University. The research of F. Ferrarotti has been funded by the Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK), the Federal Ministry for Digital and Economic Affairs (BMDW), and the State of Upper Austria in the frame of the COMET Module Dependable Production Environments with Software Security (DEPS) within the COMET - Competence Centers for Excellent Technologies Programme managed by Austrian Research Promotion Agency FFG.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anagnostopoulos, N.A., et al.: Intrinsic run-time rowhammer PUFs: leveraging the rowhammer effect for run-time cryptography and improved security. Cryptography 2(3), 13 (2018)
Börger, E., Raschke, A.: Modeling Companion for Software Practitioners. Springer, Cham (2018)
Börger, E., Stärk, R.: Abstract State Machines. Springer, Cham (2003)
Goldberg, D.E.: Genetic Algorithms in Search Optimization and Machine Learning. Addison-Wesley, Boston (1989)
Mechelinck, R., et al.: \(\mu \)GLUE: efficient and scalable software to hardware binding using Rowhammer (2023). Submitted for Publication
Schewe, K.-D., Ferrarotti, F.: Behavioural theory of reflective algorithms I: reflective sequential algorithms. Sci. Comput. Program. 223, 102864 (2022)
Schewe, K.-D., Ferrarotti, F., González, S.: A logic for reflective ASMs. Sci. Comput. Program. 210, 102691 (2021)
Schewe, K.-D., Wang, Q.: Partial updates in complex-value databases. In: Information and Knowledge Bases XXII, pp. 37–56. IOS Press (2011)
Stemple, D., et al.: Type-safe linguistic reflection: a generator technology. In: Atkinson, M.P., Welland, R. (eds.) Fully Integrated Data Environments, Esprit Basic Research Series, pp. 158–188. Springer, Cham (2000). https://doi.org/10.1007/978-3-642-59623-0_8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tong, L., Xu, K., Hu, J., Ferrarotti, F., Schewe, KD. (2023). Exploration of Reflective ASMs for Security. In: Glässer, U., Creissac Campos, J., Méry, D., Palanque, P. (eds) Rigorous State-Based Methods. ABZ 2023. Lecture Notes in Computer Science, vol 14010. Springer, Cham. https://doi.org/10.1007/978-3-031-33163-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-33163-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33162-6
Online ISBN: 978-3-031-33163-3
eBook Packages: Computer ScienceComputer Science (R0)