Secure execution environments through reconfigurable lightweight cryptographic components

PDF Version Also Available for Download.

Description

This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.

Physical Description

101 p.

Creation Information

Gomathisankaran, Mahadevan 2006.

Context

This dissertation is part of the collection entitled: UNT Scholarly Works and was provided by the UNT College of Engineering to the UNT Digital Library, a digital repository hosted by the UNT Libraries. It has been viewed 9460 times. More information about this dissertation can be viewed below.

Who

People and organizations associated with either the creation of this dissertation or its content.

Author

Chair

Committee Members

Publisher

Provided By

UNT College of Engineering

The UNT College of Engineering strives to educate and train engineers and technologists who have the vision to recognize and solve the problems of society. The college comprises six degree-granting departments of instruction and research.

Contact Us

What

Descriptive information to help identify this dissertation. Follow the links below to find similar items on the Digital Library.

Degree Information

Description

This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.

Physical Description

101 p.

Notes

Abstract: Software protection is one of the most important problems in the area of computing as it affects a multitude of players like software vendors, digital content providers, users, and government agencies. There are multiple dimensions to this broad problem of software protection. The most important ones are: 1) protecting software from reverse engineering. 2) protecting software from tamper (or modification). 3) preventing software piracy. 4) verification of integrity of the software. In this thesis the authors focus on these areas of software protection. The basic requirement to achieve these goals is to provide a secure execution environment, which ensures that the programs behave in the same way as it was designed, and the execution platforms respect certain types of wishes specified by the program. The authors take the approach of providing secure execution environment through architecture support. The authors exploit the power of reconfigurable components in achieving this. The first problem the authors consider is to provide architecture support for obfuscation. This also achieves the goals of tamper resistance, copy protection, and IP protection indirectly. The authors' approach is based on the intuition that the software is a sequence of instructions (and data) and if the sequence as well the contents are obfuscated then all the required goals can be achieved. The second problem the authors solve is integrity verification of the software particularly in embedded devices. The authors' solution is based on the intuition that an obfuscated (permuted) binary image without any dynamic traces reveals very little information about the IP of the program. Moreover, if this obfuscation function becomes a shared secret between the verifier and the embedded device then verification can be performed in a trustworthy manner. Cryptographic components form the underlying building blocks/primitives of any secure execution environment. The authors use of reconfigurable components to provide software protection in both Arc3D and TIVA led us to an interesting observation about the power of reconfigurable components. Reconfigurable components provide the ability to use the secret (or key) in a much stronger way than the convention cryptographic designs. This opened up an opportunity for us to explore the use of reconfigurable gates to build cryptographic functions.

Language

Identifier

Unique identifying numbers for this dissertation in the Digital Library or other systems.

Collections

This dissertation is part of the following collection of related materials.

UNT Scholarly Works

Materials from the UNT community's research, creative, and scholarly activities and UNT's Open Access Repository. Access to some items in this collection may be restricted.

What responsibilities do I have when using this dissertation?

When

Dates and time periods associated with this dissertation.

Creation Date

  • 2006

Added to The UNT Digital Library

  • Aug. 7, 2012, 1:52 p.m.

Description Last Updated

  • July 23, 2013, 11:33 a.m.

Usage Statistics

When was this dissertation last used?

Yesterday: 0
Past 30 days: 0
Total Uses: 9,460

Interact With This Dissertation

Here are some suggestions for what to do next.

Top Search Results

We found four places within this dissertation that matched your search. View Now

Start Reading

PDF Version Also Available for Download.

International Image Interoperability Framework

IIF Logo

We support the IIIF Presentation API

Gomathisankaran, Mahadevan. Secure execution environments through reconfigurable lightweight cryptographic components, dissertation, 2006; [Ames, Iowa]. (https://digital.library.unt.edu/ark:/67531/metadc96840/: accessed April 23, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT College of Engineering.

Back to Top of Screen