skip to main content
10.1145/378993.379237acmconferencesArticle/Chapter ViewAbstractPublication PagesasplosConference Proceedingsconference-collections
Article
Free Access

Architectural support for copy and tamper resistant software

Published:12 November 2000Publication History

ABSTRACT

Although there have been attempts to develop code transformations that yield tamper-resistant software, no reliable software-only methods are know. This paper studies the hardware implementation of a form of execute-only memory (XOM) that allows instructions stored in memory to be executed but not otherwise manipulated. To support XOM code we use a machine that supports internal compartments---a process in one compartment cannot read data from another compartment. All data that leaves the machine is encrypted, since we assume external memory is not secure. The design of this machine poses some interesting trade-offs between security, efficiency, and flexibility. We explore some of the potential security issues as one pushes the machine to become more efficient and flexible. Although security carries a performance penalty, our analysis indicates that it is possible to create a normal multi-tasking machine where nearly all applications can be run in XOM mode. While a virtual XOM machine is possible, the underlying hardware needs to support a unique private key, private memory, and traps on cache misses. For efficient operation, hardware assist to provide fast symmetric ciphers is also required.

References

  1. 1.Business Software Alliance, 2000. http://www, bsa. org.]]Google ScholarGoogle Scholar
  2. 2.The Trusted Computing Platform Allicance, 2000. http://www. trustedpc, com.]]Google ScholarGoogle Scholar
  3. 3.R. Anderson, E. Biham, and L. Knudsen. Serpent: A proposal for the advanced encryption standard. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs, htm.]]Google ScholarGoogle Scholar
  4. 4.D. Boneh, D. Lie, P. Lincoln, J. Mitchell, and M. Mitchell. Hardware support for tamper-resistant and copy-resistant software. Technical Report CS-TN-00-97, Stanford University Computer Science, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.J. Burke, J. McDonald, and T. Austin. Architectural support for fast symmetric-key cryptography. In Proceedings of the 9th International Conference Architectural Support for Programming Languages and Operating Systems, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.S. Chari, C. Jutla, J. Rao, and P. Rohatgi. Towards sound approaches to counteract power analysis attacks. In Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference, volume 1666, pages 398-412, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs, htm.]]Google ScholarGoogle Scholar
  8. 8.H. Eberle and C. Thacker. A 1Gbit/second GaAs DES chip. In Proceedings of the IEEE Custom Integrated Circuits Conference, pages 19.7.1-19.7.4, May 1992.]]Google ScholarGoogle Scholar
  9. 9.Wave Corporation Embassy Technology, 2000. http://www, wave. com.]]Google ScholarGoogle Scholar
  10. 10.T. Gilmont, J.-D. Legat, and J.-J. Quisquater. An architecture of security management unit for safe hosting of multiple agents. In Proceedings of the International Workshop on Intelligent Communications and Multimedia Tervninals, pages 79-82, November 1998.]]Google ScholarGoogle Scholar
  11. 11.T. Gilmont, J.-D. Legat, and J.-J. Quisquater. Hardware security for software privacy support. Electronics Letters, 35(24):2096-2097, November 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. 12.R.P. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7(6):35-45, June 1974.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.B. Kaliski Jr. and M. Robshaw. Message authentication with MD5. CryptoBytes, 1(1):5-8, 1995.]]Google ScholarGoogle Scholar
  14. 14.P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference, volume 1666, pages 388-397, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. http://www, ietf. org/rfc/rfc2104.txt, February 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.K. Krewell. Quicktake: Willamette revealed. Technical report, Calmers Microprocessor, February 2000. Available at www. MPRonline. com.]]Google ScholarGoogle Scholar
  17. 17.B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authenticaton in distributed systems: Theory and practice. In Proccedings of the 13th ACM Symposium on Operating Systems, volume 10, pages 265-310, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.A. Maynard, C. Donnelly, and B. Olszewski. Contrasting characteristics and cache performance of technical and multi-user commercial workloads. In Proceedings of the 6th International Conference Architectural Support for Programming Languages and Operating Systems, pages 145-1567 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.A.J. Menzies, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.]]Google ScholarGoogle Scholar
  20. 20.National Bureau of Standards. NBS FIPS PUB 467 "Data Encryption Standard". National Bureau of Standards, U.S. Department of Commerce, January 1977.]]Google ScholarGoogle Scholar
  21. 21.S. Polonsky, D. Knebel, P. Sandal M. McManus, W. Huott, A. Pelella, D. Manzer, S. Steen, S. Wilson, and Y. Chan. Non-invasive timing analysis of IBM G6 microprocessor L1 cache using backside time-resolved hot electron luminescence. In Proceedings of the IEEE International Solid-state Circuits Conference, pages 222-2247 2000.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.ANSI X9.17 (Revised). American national standard for financial institution key management (wholesale). American Bankers Association, 1985.]]Google ScholarGoogle Scholar
  23. 23.J. Saltzer and M. Schroeder. The protection of information in computer systems. IEEE, 63(9):1278-13087 September 1975.]]Google ScholarGoogle ScholarCross RefCross Ref
  24. 24.B. Schneier. Applied Cryptography. John Wiley & Sons, 2nd edition, 1996.]]Google ScholarGoogle Scholar
  25. 25.W. Tuchman. Hellman presents no shortcut solutions to DES. IEEE Spectrum, 16(7):40-417 July 1979.]]Google ScholarGoogle ScholarCross RefCross Ref
  26. 26.J. Tygar and B. Yee. Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R7 Carnegie Mellon University, May 1991.]]Google ScholarGoogle Scholar
  27. 27.B. Weeks, M. Bean, T. Rozylowicz, and C. Ficke. Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency, August 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2anlsys, htm.]]Google ScholarGoogle Scholar

Index Terms

  1. Architectural support for copy and tamper resistant software

                        Recommendations

                        Comments

                        Login options

                        Check if you have access through your login credentials or your institution to get full access on this article.

                        Sign in
                        • Published in

                          cover image ACM Conferences
                          ASPLOS IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
                          November 2000
                          271 pages
                          ISBN:1581133170
                          DOI:10.1145/378993
                          • cover image ACM SIGOPS Operating Systems Review
                            ACM SIGOPS Operating Systems Review  Volume 34, Issue 5
                            Dec. 2000
                            269 pages
                            ISSN:0163-5980
                            DOI:10.1145/384264
                            Issue’s Table of Contents
                          • cover image ACM SIGARCH Computer Architecture News
                            ACM SIGARCH Computer Architecture News  Volume 28, Issue 5
                            Special Issue: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems (ASPLOS '00)
                            Dec. 2000
                            269 pages
                            ISSN:0163-5964
                            DOI:10.1145/378995
                            Issue’s Table of Contents

                          Copyright © 2000 ACM

                          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                          Publisher

                          Association for Computing Machinery

                          New York, NY, United States

                          Publication History

                          • Published: 12 November 2000

                          Permissions

                          Request permissions about this article.

                          Request Permissions

                          Check for updates

                          Qualifiers

                          • Article

                          Acceptance Rates

                          ASPLOS IX Paper Acceptance Rate24of114submissions,21%Overall Acceptance Rate535of2,713submissions,20%

                        PDF Format

                        View or Download as a PDF file.

                        PDF

                        eReader

                        View online with eReader.

                        eReader