Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Exploration of Reflective ASMs for Security

  • Conference paper
  • First Online:
Rigorous State-Based Methods (ABZ 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14010))

Included in the following conference series:

  • 280 Accesses

Abstract

We show how reflective ASMs can support hardware-software binding, which can be used for copy protection, and we exploit the logic of rASMs to express desirable properties for this application.

The research of the first three authors has been funded by the Student Research Training Program of Zhejiang University. The research of F. Ferrarotti has been funded by the Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK), the Federal Ministry for Digital and Economic Affairs (BMDW), and the State of Upper Austria in the frame of the COMET Module Dependable Production Environments with Software Security (DEPS) within the COMET - Competence Centers for Excellent Technologies Programme managed by Austrian Research Promotion Agency FFG.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Anagnostopoulos, N.A., et al.: Intrinsic run-time rowhammer PUFs: leveraging the rowhammer effect for run-time cryptography and improved security. Cryptography 2(3), 13 (2018)

    Article  MathSciNet  Google Scholar 

  2. Börger, E., Raschke, A.: Modeling Companion for Software Practitioners. Springer, Cham (2018)

    Book  Google Scholar 

  3. Börger, E., Stärk, R.: Abstract State Machines. Springer, Cham (2003)

    Book  MATH  Google Scholar 

  4. Goldberg, D.E.: Genetic Algorithms in Search Optimization and Machine Learning. Addison-Wesley, Boston (1989)

    MATH  Google Scholar 

  5. Mechelinck, R., et al.: \(\mu \)GLUE: efficient and scalable software to hardware binding using Rowhammer (2023). Submitted for Publication

    Google Scholar 

  6. Schewe, K.-D., Ferrarotti, F.: Behavioural theory of reflective algorithms I: reflective sequential algorithms. Sci. Comput. Program. 223, 102864 (2022)

    Article  Google Scholar 

  7. Schewe, K.-D., Ferrarotti, F., González, S.: A logic for reflective ASMs. Sci. Comput. Program. 210, 102691 (2021)

    Article  Google Scholar 

  8. Schewe, K.-D., Wang, Q.: Partial updates in complex-value databases. In: Information and Knowledge Bases XXII, pp. 37–56. IOS Press (2011)

    Google Scholar 

  9. Stemple, D., et al.: Type-safe linguistic reflection: a generator technology. In: Atkinson, M.P., Welland, R. (eds.) Fully Integrated Data Environments, Esprit Basic Research Series, pp. 158–188. Springer, Cham (2000). https://doi.org/10.1007/978-3-642-59623-0_8

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Klaus-Dieter Schewe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tong, L., Xu, K., Hu, J., Ferrarotti, F., Schewe, KD. (2023). Exploration of Reflective ASMs for Security. In: Glässer, U., Creissac Campos, J., Méry, D., Palanque, P. (eds) Rigorous State-Based Methods. ABZ 2023. Lecture Notes in Computer Science, vol 14010. Springer, Cham. https://doi.org/10.1007/978-3-031-33163-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-33163-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-33162-6

  • Online ISBN: 978-3-031-33163-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics