Show simple item record

dc.contributor.advisorSrini Devadas
dc.contributor.authorO'Donnell, Charles W.
dc.contributor.authorSuh,, G. Edward
dc.contributor.authorDijk, Marten vn
dc.contributor.authorDevadas, Srinivas
dc.contributor.otherComputation Structures
dc.date.accessioned2006-12-08T16:51:48Z
dc.date.available2006-12-08T16:51:48Z
dc.date.issued2006-12-08
dc.identifier.otherMIT-CSAIL-TR-2006-080
dc.identifier.urihttp://hdl.handle.net/1721.1/34954
dc.description.abstractApplication source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, these capabilities incur a sizeable performance overhead. Partitioning an application into secure and insecure regions can help diminish these overheads but invalidates guarantees of code secrecy and copy protection.This work examines one of the problems of partitioning an application into public and private regions, the ability of an adversary to recreate those private regions. To our knowledge, it is the first to analyze this problem when considering application operation as a whole. Looking at the fundamentals of the issue, we analyze one of the simplest attacks possible, a ``Memoization Attack.'' We implement an efficient Memoization Attack and discuss necessary techniques that limit storage and computation consumption. Experimentation reveals that certain classes of real-world applications are vulnerable to Memoization Attacks. To protect against such an attack, we propose a set of indicator tests that enable an application designer to identify susceptible application code regions.
dc.format.extent11 p.
dc.format.extent436268 bytes
dc.format.extent1481611 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_US
dc.relation.ispartofseriesMassachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
dc.subjectSecurity
dc.subjectArchitecture
dc.subjectTrusted Execution
dc.subjectSecurity Analysis
dc.subjectDigital Rights Management
dc.titleMemoization Attacks and Copy Protection in Partitioned Applications


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record