Architecture Support for 3D Obfuscation Metadata

Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.


  • Main Title Architecture Support for 3D Obfuscation


  • Author: Gomathisankaran, Mahadevan
    Creator Type: Personal
    Creator Info: University of North Texas; Iowa State University
  • Author: Tyagi, Akhilesh
    Creator Type: Personal
    Creator Info: Iowa State University


  • Name: Institute of Electrical and Electronics Engineers
    Place of Publication: [New York, New York]


  • Creation: 2006-05


  • English


  • Content Description: Article discussing research on architecture support for 3D obfuscation.
  • Physical Description: 17 p.


  • Keyword: obfuscation
  • Keyword: digital rights management
  • Keyword: secure systems architecture


  • Journal: IEEE Transactions on Computers, 2006, New York: Institute of Electrical and Electronics Engineers


  • Publication Title: IEEE Transactions on Computers
  • Volume: 55
  • Issue: 5
  • Page Start: 497
  • Page End: 507
  • Peer Reviewed: True


  • Name: UNT Scholarly Works
    Code: UNTSW


  • Name: UNT College of Engineering
    Code: UNTCOE


  • Rights Access: public

Resource Type

  • Article


  • Text


  • DOI: 10.1109/TC.2006.68
  • Archival Resource Key: ark:/67531/metadc132973


  • Academic Department: Computer Science and Engineering


  • Display Note: © 2006 IEEE. Reprinted, with permission, from [Mahadevan Gomathisankaran and Akhilesh Tyagi, Architecture Support for 3D Obfuscation, IEEE Transactions on Computers, May 2006]. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of North Texas' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
  • Display Note: Abstract: Software obfuscation is defined as a transformation of a program P into T(P) such that the whitebox and blackbox behaviors of T(P) are computationally indistinguishable. However, robust obfuscation is impossible to achieve with the existing software only solutions. This results from the power of the adversary model in DRM which is significantly more than in the traditional security scenarios. The adversary has complete control of the computing node - supervisory privileges along with the full physical as well as architectural object observational capabilities. In essence, this makes the operating system (or any other layer around the architecture) untrustworthy. Thus the trust has to be provided by the underlying architecture. In this paper, the authors develop an architecture to support 3-D obfuscation through the use of well known cryptographic methods. The three dimensional obfuscation hides the address sequencing, the contents associated with an address, and the temporal reuse of address sequences such as in loops (or the second order address sequencing). The software is kept as an obfuscated file system image statically. Moreover, its execution traces are also dynamically obfuscated along all the three dimensions of address sequencing, contents and second order address sequencing. Such an obfuscation makes it infinitesimally likely that good tampering points can be detected. This in turn provides with a very good degree of tamper resistance. With the use of already known software distribution model of ABYSS and XOM, the authors can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.