Tamper resistant software: an implementation

  • David Aucsmith
Conference paper

DOI: 10.1007/3-540-61996-8_49

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1174)
Cite this paper as:
Aucsmith D. (1996) Tamper resistant software: an implementation. In: Anderson R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg

Abstract

This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described.

The architecture consists of segment of code, called an Integrity Verification Kernel, which is self-modifying, self-decrypting, and installation unique. This code segment communicates with other such code segments to create an Interlocking Trust model.

The paper concludes with speculation of additional uses of the developed technology and an evaluation of the technology's effectiveness.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag 1996

Authors and Affiliations

  • David Aucsmith
    • 1
  1. 1.IALUSA

Personalised recommendations