Architecture Support for 3D Obfuscation

Description:

Article discussing research on architecture support for 3D obfuscation.

Creator(s):
Creation Date: May 2006
Partner(s):
UNT College of Engineering
Collection(s):
UNT Scholarly Works
Usage:
Total Uses: 50
Past 30 days: 2
Yesterday: 0
Creator (Author):
Gomathisankaran, Mahadevan

University of North Texas; Iowa State University

Creator (Author):
Tyagi, Akhilesh

Iowa State University

Publisher Info:
Place of Publication: [New York, New York]
Date(s):
  • Creation: May 2006
Description:

Article discussing research on architecture support for 3D obfuscation.

Degree:
Note:

© 2006 IEEE. Reprinted, with permission, from [Mahadevan Gomathisankaran and Akhilesh Tyagi, Architecture Support for 3D Obfuscation, IEEE Transactions on Computers, May 2006].

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of North Texas' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Note:

Abstract: Software obfuscation is defined as a transformation of a program P into T(P) such that the whitebox and blackbox behaviors of T(P) are computationally indistinguishable. However, robust obfuscation is impossible to achieve with the existing software only solutions. This results from the power of the adversary model in DRM which is significantly more than in the traditional security scenarios. The adversary has complete control of the computing node - supervisory privileges along with the full physical as well as architectural object observational capabilities. In essence, this makes the operating system (or any other layer around the architecture) untrustworthy. Thus the trust has to be provided by the underlying architecture. In this paper, the authors develop an architecture to support 3-D obfuscation through the use of well known cryptographic methods. The three dimensional obfuscation hides the address sequencing, the contents associated with an address, and the temporal reuse of address sequences such as in loops (or the second order address sequencing). The software is kept as an obfuscated file system image statically. Moreover, its execution traces are also dynamically obfuscated along all the three dimensions of address sequencing, contents and second order address sequencing. Such an obfuscation makes it infinitesimally likely that good tampering points can be detected. This in turn provides with a very good degree of tamper resistance. With the use of already known software distribution model of ABYSS and XOM, the authors can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.

Physical Description:

17 p.

Language(s):
Subject(s):
Keyword(s): obfuscation | digital rights management | secure systems architecture
Source: IEEE Transactions on Computers, 2006, New York: Institute of Electrical and Electronics Engineers
Partner:
UNT College of Engineering
Collection:
UNT Scholarly Works
Identifier:
  • DOI: 10.1109/TC.2006.68
  • ARK: ark:/67531/metadc132973
Resource Type: Article
Format: Text
Rights:
Access: Public
Citation:
Publication Title: IEEE Transactions on Computers
Volume: 55
Issue: 5
Page Start: 497
Page End: 507
Peer Reviewed: Yes