Oblivious Hashing: A Stealthy Software Integrity Verification Primitive

  • Authors:
  • Yuqun Chen;Ramarathnam Venkatesan;Matthew Cary;Ruoming Pang;Saurabh Sinha;Mariusz H. Jakubowski

  • Affiliations:
  • -;-;-;-;-;-

  • Venue:
  • IH '02 Revised Papers from the 5th International Workshop on Information Hiding
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.