TY - CHAP
T1 - Oblivious hashing
T2 - A stealthy software integrity verification primitive
AU - Chen, Yuqun
AU - Venkatesan, Ramarathnam
AU - Cary, Matthew
AU - Pang, Ruoming
AU - Sinha, Saurabh
AU - Jakubowski, Mariusz H.
PY - 2003
Y1 - 2003
N2 - We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.
AB - We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.
UR - http://www.scopus.com/inward/record.url?scp=35248822611&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35248822611&partnerID=8YFLogxK
U2 - 10.1007/3-540-36415-3_26
DO - 10.1007/3-540-36415-3_26
M3 - Chapter
AN - SCOPUS:35248822611
SN - 3540004211
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 400
EP - 414
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A2 - Petitcolas, Fabien A. P.
PB - Springer
ER -