Tamper resistant software: an implementation View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1996

AUTHORS

David Aucsmith

ABSTRACT

This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described. The architecture consists of segment of code, called an Integrity Verification Kernel, which is self-modifying, self-decrypting, and installation unique. This code segment communicates with other such code segments to create an Interlocking Trust model. The paper concludes with speculation of additional uses of the developed technology and an evaluation of the technology's effectiveness. More... »

PAGES

317-333

Book

TITLE

Information Hiding

ISBN

978-3-540-61996-3
978-3-540-49589-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-61996-8_49

DOI

http://dx.doi.org/10.1007/3-540-61996-8_49

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1017797835


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "IAL, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aucsmith", 
        "givenName": "David", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/359340.359342", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013337011"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described. The architecture consists of segment of code, called an Integrity Verification Kernel, which is self-modifying, self-decrypting, and installation unique. This code segment communicates with other such code segments to create an Interlocking Trust model. The paper concludes with speculation of additional uses of the developed technology and an evaluation of the technology's effectiveness.", 
    "editor": [
      {
        "familyName": "Anderson", 
        "givenName": "Ross", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-61996-8_49", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-61996-3", 
        "978-3-540-49589-5"
      ], 
      "name": "Information Hiding", 
      "type": "Book"
    }, 
    "name": "Tamper resistant software: an implementation", 
    "pagination": "317-333", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-61996-8_49"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "54cce94b60d09045c7b2dae13f852b17ec3763687f84045e97318c92c4645ca0"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1017797835"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-61996-8_49", 
      "https://app.dimensions.ai/details/publication/pub.1017797835"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T21:57", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000254.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-61996-8_49"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-61996-8_49'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-61996-8_49'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-61996-8_49'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-61996-8_49'


 

This table displays all metadata directly associated to this object as RDF triples.

66 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-61996-8_49 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author Nca5419692fdc441ea5bf93bbbe46462c
4 schema:citation https://doi.org/10.1145/359340.359342
5 schema:datePublished 1996
6 schema:datePublishedReg 1996-01-01
7 schema:description This paper describes a technology for the construction of tamper resistant software. It presents a threat model and design principles for countering a defined subset of the threat. The paper then presents an architecture and implementation of tamper resistant software based on the principles described. The architecture consists of segment of code, called an Integrity Verification Kernel, which is self-modifying, self-decrypting, and installation unique. This code segment communicates with other such code segments to create an Interlocking Trust model. The paper concludes with speculation of additional uses of the developed technology and an evaluation of the technology's effectiveness.
8 schema:editor N8ed1cf5c8f59455491aa3edf9ae3af08
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N29afbf38ade349de9d9bd25dc359e837
13 schema:name Tamper resistant software: an implementation
14 schema:pagination 317-333
15 schema:productId N306908f6fd9643758b5b42e7bdecb2de
16 N369498ee097c4c4e9427ac5e31fc9ec8
17 Nab587a703cea441c9338ea33c0092917
18 schema:publisher Nd35390db3bf8433c9ed4810e99f7a446
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017797835
20 https://doi.org/10.1007/3-540-61996-8_49
21 schema:sdDatePublished 2019-04-15T21:57
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher N07b2c385afdc41468a67e515b0b7ea71
24 schema:url http://link.springer.com/10.1007/3-540-61996-8_49
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N07b2c385afdc41468a67e515b0b7ea71 schema:name Springer Nature - SN SciGraph project
29 rdf:type schema:Organization
30 N25c7a20ee50b4db88f596c23aaff4e3e schema:name IAL, USA
31 rdf:type schema:Organization
32 N29afbf38ade349de9d9bd25dc359e837 schema:isbn 978-3-540-49589-5
33 978-3-540-61996-3
34 schema:name Information Hiding
35 rdf:type schema:Book
36 N306908f6fd9643758b5b42e7bdecb2de schema:name dimensions_id
37 schema:value pub.1017797835
38 rdf:type schema:PropertyValue
39 N369498ee097c4c4e9427ac5e31fc9ec8 schema:name doi
40 schema:value 10.1007/3-540-61996-8_49
41 rdf:type schema:PropertyValue
42 N60bc4a2506a6418883be29fd9a025fae schema:affiliation N25c7a20ee50b4db88f596c23aaff4e3e
43 schema:familyName Aucsmith
44 schema:givenName David
45 rdf:type schema:Person
46 N675f3e7b4f4b42c1aaeb5f16a099b7c2 schema:familyName Anderson
47 schema:givenName Ross
48 rdf:type schema:Person
49 N8ed1cf5c8f59455491aa3edf9ae3af08 rdf:first N675f3e7b4f4b42c1aaeb5f16a099b7c2
50 rdf:rest rdf:nil
51 Nab587a703cea441c9338ea33c0092917 schema:name readcube_id
52 schema:value 54cce94b60d09045c7b2dae13f852b17ec3763687f84045e97318c92c4645ca0
53 rdf:type schema:PropertyValue
54 Nca5419692fdc441ea5bf93bbbe46462c rdf:first N60bc4a2506a6418883be29fd9a025fae
55 rdf:rest rdf:nil
56 Nd35390db3bf8433c9ed4810e99f7a446 schema:location Berlin, Heidelberg
57 schema:name Springer Berlin Heidelberg
58 rdf:type schema:Organisation
59 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
60 schema:name Information and Computing Sciences
61 rdf:type schema:DefinedTerm
62 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
63 schema:name Computer Software
64 rdf:type schema:DefinedTerm
65 https://doi.org/10.1145/359340.359342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013337011
66 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...