IBM Systems Journal - Special issue on cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Dynamic Self-Checking Techniques for Improved Tamper Resistance
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Hi-index | 0.00 |
In this paper we illustrate how Tamper Resistant Software or TRS, can within a temporal window extend trust into a hostile environment such as mobile devices and set top boxes. We state and reference our approach to TRS and illustrate a high level attack. We currently estimate that it would take a Class II attacker a month to reverse engineer the TRS we can automatically produce from an existing program. This is based on Data Flow encoding only. With Control Flow encoding and improved Data Flow encodings we expect the attack times to exceed a year.