Tamper resistant software: extending trust into a hostile environment

  • Authors:
  • J. R. Nickerson;S. T. Chow;H. J. Johnson

  • Affiliations:
  • Cloakware Corporation, Kanata, ON, Canada;Cloakware Corporation, Kanata, ON, Canada;Cloakware Corporation, Kanata, ON, Canada

  • Venue:
  • MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we illustrate how Tamper Resistant Software or TRS, can within a temporal window extend trust into a hostile environment such as mobile devices and set top boxes. We state and reference our approach to TRS and illustrate a high level attack. We currently estimate that it would take a Class II attacker a month to reverse engineer the TRS we can automatically produce from an existing program. This is based on Data Flow encoding only. With Control Flow encoding and improved Data Flow encodings we expect the attack times to exceed a year.