Architecture Support for 3D Obfuscation Metadata
Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.
- Main Title Architecture Support for 3D Obfuscation
Author: Gomathisankaran, MahadevanCreator Type: PersonalCreator Info: University of North Texas; Iowa State University
Author: Tyagi, AkhileshCreator Type: PersonalCreator Info: Iowa State University
Name: Institute of Electrical and Electronics EngineersPlace of Publication: [New York, New York]
- Creation: 2006-05
- Content Description: Article discussing research on architecture support for 3D obfuscation.
- Physical Description: 17 p.
- Keyword: obfuscation
- Keyword: digital rights management
- Keyword: secure systems architecture
- Journal: IEEE Transactions on Computers, 2006, New York: Institute of Electrical and Electronics Engineers
- Publication Title: IEEE Transactions on Computers
- Volume: 55
- Issue: 5
- Page Start: 497
- Page End: 507
- Peer Reviewed: True
Name: UNT Scholarly WorksCode: UNTSW
Name: UNT College of EngineeringCode: UNTCOE
- Rights Access: public
- DOI: 10.1109/TC.2006.68
- Archival Resource Key: ark:/67531/metadc132973
- Academic Department: Computer Science and Engineering
- Display Note: © 2006 IEEE. Reprinted, with permission, from [Mahadevan Gomathisankaran and Akhilesh Tyagi, Architecture Support for 3D Obfuscation, IEEE Transactions on Computers, May 2006]. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of North Texas' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to email@example.com. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
- Display Note: Abstract: Software obfuscation is defined as a transformation of a program P into T(P) such that the whitebox and blackbox behaviors of T(P) are computationally indistinguishable. However, robust obfuscation is impossible to achieve with the existing software only solutions. This results from the power of the adversary model in DRM which is significantly more than in the traditional security scenarios. The adversary has complete control of the computing node - supervisory privileges along with the full physical as well as architectural object observational capabilities. In essence, this makes the operating system (or any other layer around the architecture) untrustworthy. Thus the trust has to be provided by the underlying architecture. In this paper, the authors develop an architecture to support 3-D obfuscation through the use of well known cryptographic methods. The three dimensional obfuscation hides the address sequencing, the contents associated with an address, and the temporal reuse of address sequences such as in loops (or the second order address sequencing). The software is kept as an obfuscated file system image statically. Moreover, its execution traces are also dynamically obfuscated along all the three dimensions of address sequencing, contents and second order address sequencing. Such an obfuscation makes it infinitesimally likely that good tampering points can be detected. This in turn provides with a very good degree of tamper resistance. With the use of already known software distribution model of ABYSS and XOM, the authors can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.