作者
Paul C Van Oorschot, Anil Somayaji, Glenn Wurster
发表日期
2005/4
期刊
IEEE Transactions on Dependable and Secure Computing
卷号
2
期号
2
页码范围
82-92
出版商
IEEE
简介
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of this approach to software tamper resistance include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability to integrate code protection mechanisms automatically. In this paper, we show that the rich functionality of most modern general-purpose processors (including UltraSparc, x86, PowerPC, AMD64, Alpha, and ARM) facilitate an automated, generic attack which defeats such self-hashing. We present a general description of the attack strategy and multiple attack implementations that exploit different processor features. Each of these implementations is generic in that it can defeat self-hashing employed by any user-space program on a single platform. Together, these implementations defeat self-hashing on most modern general-purpose …
引用总数
200520062007200820092010201120122013201420152016201720182019202020212022202320242581381593489124572241
学术搜索中的文章
PC Van Oorschot, A Somayaji, G Wurster - IEEE Transactions on Dependable and Secure …, 2005