Skip to main content

Arc3D: A 3D Obfuscation Architecture

  • Conference paper
High Performance Embedded Architectures and Compilers (HiPEAC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3793))

Abstract

In DRM domain, the adversary has complete control of the computing node – supervisory privileges along with full physical as well as architectural object observational capabilities. Thus robust obfuscation is impossible to achieve with the existing software only solutions. In this paper, we develop architecture level support for obfuscation with the help of well known cryptographic methods. The three protected dimensions of this architecture Arc3D are address sequencing, contents associated with an address, and the temporal reuse of address sequences such as loops. Such an obfuscation makes the detection of good tampering points infinitesimally likely providing tamper resistance. With the use of already known software distribution model of ABYSS and XOM, we can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Business Software Alliance: Second Annual BSA and IDC Global Software Piracy Study, Trends in software piracy 1994-2004 (May 2005)

    Google Scholar 

  2. Lie, D., et al.: Architectural support for copy and tamper resistant software. In: Proceedings of ASPLOS 2000, pp. 168–177 (2000)

    Google Scholar 

  3. Zhuang, X., et al.: HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus. In: Proceedings of ASPLOS 2004 (2004)

    Google Scholar 

  4. White, S.R., Comerford, L.: ABYSS: An Architecture for Software Protection. IEEE Transactions on Software Engineering 16(6), 619–629 (1990)

    Article  Google Scholar 

  5. Kuhn, M.: The TrustNo1 Cryptoprocessor Concept, Technical Report, Purdue University, 1997-04-30

    Google Scholar 

  6. Microsoft. Next-generation secure computing base (2003)

    Google Scholar 

  7. Trusted Computing Platform Alliance. Trusted Platform Module (2003)

    Google Scholar 

  8. TPM Design Principles, Version 1.2. Trusted Platform Module (October 2003)

    Google Scholar 

  9. Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Proceedings of the First International Workshop on Information Hiding (1996)

    Google Scholar 

  10. Collberg, C., et al.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering 28(8) (2002)

    Google Scholar 

  11. Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM 43(3), 431–473 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  12. Fredkin, E., Toffoli, T.: Conservative Logic. International Journal of Theoretical Physics 21(3/4) (April 1982)

    Google Scholar 

  13. Bennett, R., Landauer, R.: Fundamental Physical Limits of Computation. Scientific American, 48–58 (July 1985)

    Google Scholar 

  14. Toffoli, T.: Reversible Computing. Technical Report MIT/LCS/TM151/1980, MIT Laboratory for Computer Science (1980)

    Google Scholar 

  15. DeHon, A.: DPGA-coupled microprocessor: Commodity ICs for the early 21st centry. In: Proc. of IEEE workshop on FPGAs for Custom Computing Machines, April 1994, pp. 31–39 (1994)

    Google Scholar 

  16. HMAC. Internet RFC 2104 (February 1997)

    Google Scholar 

  17. Cvetanovic, Z., et al.: Performance analysis of the Alpha 21264-Based Compaq ES40 System. In: Proc. of ISCA 2000, pp. 192–202 (2000)

    Google Scholar 

  18. Intel 80200 Processor based on Intel XSCALE Microarchitecture Datasheet, Intel (January 2003)

    Google Scholar 

  19. Specbench. Spec 2000 Benchmarks

    Google Scholar 

  20. Burger, D., Austin, T.M.: The SimpleScalar Tool Set, Version 2.0. Computer Sciences Department Technical report #1342. University of Wisconsin-Madison (June 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gomathisankaran, M., Tyagi, A. (2005). Arc3D: A 3D Obfuscation Architecture. In: Conte, T., Navarro, N., Hwu, Wm.W., Valero, M., Ungerer, T. (eds) High Performance Embedded Architectures and Compilers. HiPEAC 2005. Lecture Notes in Computer Science, vol 3793. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11587514_13

Download citation

  • DOI: https://doi.org/10.1007/11587514_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30317-6

  • Online ISBN: 978-3-540-32272-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics