Abstract
In DRM domain, the adversary has complete control of the computing node – supervisory privileges along with full physical as well as architectural object observational capabilities. Thus robust obfuscation is impossible to achieve with the existing software only solutions. In this paper, we develop architecture level support for obfuscation with the help of well known cryptographic methods. The three protected dimensions of this architecture Arc3D are address sequencing, contents associated with an address, and the temporal reuse of address sequences such as loops. Such an obfuscation makes the detection of good tampering points infinitesimally likely providing tamper resistance. With the use of already known software distribution model of ABYSS and XOM, we can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Business Software Alliance: Second Annual BSA and IDC Global Software Piracy Study, Trends in software piracy 1994-2004 (May 2005)
Lie, D., et al.: Architectural support for copy and tamper resistant software. In: Proceedings of ASPLOS 2000, pp. 168–177 (2000)
Zhuang, X., et al.: HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus. In: Proceedings of ASPLOS 2004 (2004)
White, S.R., Comerford, L.: ABYSS: An Architecture for Software Protection. IEEE Transactions on Software Engineering 16(6), 619–629 (1990)
Kuhn, M.: The TrustNo1 Cryptoprocessor Concept, Technical Report, Purdue University, 1997-04-30
Microsoft. Next-generation secure computing base (2003)
Trusted Computing Platform Alliance. Trusted Platform Module (2003)
TPM Design Principles, Version 1.2. Trusted Platform Module (October 2003)
Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Proceedings of the First International Workshop on Information Hiding (1996)
Collberg, C., et al.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering 28(8) (2002)
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM 43(3), 431–473 (1996)
Fredkin, E., Toffoli, T.: Conservative Logic. International Journal of Theoretical Physics 21(3/4) (April 1982)
Bennett, R., Landauer, R.: Fundamental Physical Limits of Computation. Scientific American, 48–58 (July 1985)
Toffoli, T.: Reversible Computing. Technical Report MIT/LCS/TM151/1980, MIT Laboratory for Computer Science (1980)
DeHon, A.: DPGA-coupled microprocessor: Commodity ICs for the early 21st centry. In: Proc. of IEEE workshop on FPGAs for Custom Computing Machines, April 1994, pp. 31–39 (1994)
HMAC. Internet RFC 2104 (February 1997)
Cvetanovic, Z., et al.: Performance analysis of the Alpha 21264-Based Compaq ES40 System. In: Proc. of ISCA 2000, pp. 192–202 (2000)
Intel 80200 Processor based on Intel XSCALE Microarchitecture Datasheet, Intel (January 2003)
Specbench. Spec 2000 Benchmarks
Burger, D., Austin, T.M.: The SimpleScalar Tool Set, Version 2.0. Computer Sciences Department Technical report #1342. University of Wisconsin-Madison (June 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gomathisankaran, M., Tyagi, A. (2005). Arc3D: A 3D Obfuscation Architecture. In: Conte, T., Navarro, N., Hwu, Wm.W., Valero, M., Ungerer, T. (eds) High Performance Embedded Architectures and Compilers. HiPEAC 2005. Lecture Notes in Computer Science, vol 3793. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11587514_13
Download citation
DOI: https://doi.org/10.1007/11587514_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30317-6
Online ISBN: 978-3-540-32272-6
eBook Packages: Computer ScienceComputer Science (R0)