{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:45Z","timestamp":1750308225929,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2005,3,1]],"date-time":"2005-03-01T00:00:00Z","timestamp":1109635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGARCH Comput. Archit. News"],"published-print":{"date-parts":[[2005,3]]},"abstract":"<jats:p>Recently, there is a growing interest in the research community to employ tamper-resistant processors for software protection. Many of these proposed systems rely on a specially tailored secure processor to prevent 1) illegal software duplication, 2) unauthorized software modification, and 3) unauthorized software reverse engineering. Most of these works primarily focus on the feasibility demonstration and design details rather than trying to elucidate many fundamental issues that are either \"elusive\" or \"confusing\" to the architecture researchers. Furthermore, many proposed systems have been built on assumptions whose security implications have not been well studied or understood. Instead of proposing yet another new secure architecture model, in this paper, we will try to answer some of these fundamental questions with respect to using hardware-based cryptography for protecting software execution. Those issues include, 1) Is hardware cryptography necessary? 2) Is per-process single cryptography key enough to provide the flexibility, inter-operability, and compatibility required by today's complex software system? 3) Is OTP (one-time-pad) in combination with \"lazy\" authentication secure enough to protect software confidentiality? 4) Is there way to protect software integrity using less hardware resource? Finally, the paper defines the difference between off-line and on-line attacks and presents a very low overhead security enhancement technique that can improve protection on software integrity over on-line attacks by several magnitudes.<\/jats:p>","DOI":"10.1145\/1055626.1055629","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"6-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Towards the issues in architectural support for protection of software execution"],"prefix":"10.1145","volume":"33","author":[{"given":"Weidong","family":"Shi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Hsien-Hsin S.","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Chenghuai","family":"Lu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Mrinmoy","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2005,3]]},"reference":[{"volume-title":"A Fast Secure Architecture for Protecting the Integrity and Privacy of Software. Submitted for publicationhttp:\/\/www.cc.gatech.edu\/people\/home\/lulu\/Mtree.pdf","year":"2004","key":"e_1_2_1_1_1","unstructured":"M-TREE : A Fast Secure Architecture for Protecting the Integrity and Privacy of Software. Submitted for publicationhttp:\/\/www.cc.gatech.edu\/people\/home\/lulu\/Mtree.pdf , 2004 .]] M-TREE: A Fast Secure Architecture for Protecting the Integrity and Privacy of Software. Submitted for publicationhttp:\/\/www.cc.gatech.edu\/people\/home\/lulu\/Mtree.pdf, 2004.]]"},{"key":"e_1_2_1_2_1","volume-title":"https:\/\/www.trustedcomputinggroup.org\/home","author":"Computing Platform Alliance The Trusted","year":"2003","unstructured":"The Trusted Computing Platform Alliance . https:\/\/www.trustedcomputinggroup.org\/home . 2003 .]] The Trusted Computing Platform Alliance. https:\/\/www.trustedcomputinggroup.org\/home. 2003.]]"},{"key":"e_1_2_1_3_1","first-page":"65","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"Arbaugh W. A.","unstructured":"W. A. Arbaugh , D. J. Farber , and J. M. Smith . A secure and reliable bootstrap architecture . In Proceedings of the 1997 IEEE Symposium on Security and Privacy , page 65 . IEEE Computer Society, 1997.]] W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 65. IEEE Computer Society, 1997.]]"},{"key":"e_1_2_1_4_1","unstructured":"Compaq Computer. Alpha 21264 Microprocessor Hardware Reference Manual.]]  Compaq Computer. Alpha 21264 Microprocessor Hardware Reference Manual.]]"},{"key":"e_1_2_1_5_1","volume-title":"Advanced Encryption Standard (AES)","author":"Processing Standard Draft Federal Information","year":"2001","unstructured":"Federal Information Processing Standard Draft . Advanced Encryption Standard (AES) . National Institute of Standards and Technology , 2001 .]] Federal Information Processing Standard Draft. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.]]"},{"key":"e_1_2_1_6_1","volume-title":"MIT AI Memo","author":"Huang A.","year":"2002","unstructured":"A. Huang . Keeping secrets in hardware the microsoft xbox case study . MIT AI Memo , 2002 .]] A. Huang. Keeping secrets in hardware the microsoft xbox case study. MIT AI Memo, 2002.]]"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_2_1_9_1","unstructured":"Matt Pritchard. How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It. http:\/\/www.gamasutra.com\/features\/20000724\/pritchard01.htm.]]  Matt Pritchard. How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It. http:\/\/www.gamasutra.com\/features\/20000724\/pritchard01.htm.]]"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Ninth Annual Symposium on High Performance Computer Architecture","author":"Suh E.","year":"2003","unstructured":"E. Suh , B. Gassend , D. Clarke , M. Van Dijk , and S. Devadas . Caches and merkle trees for efficient memory authentication . In Proceedings of the Ninth Annual Symposium on High Performance Computer Architecture , February 2003 .]] E. Suh, B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas. Caches and merkle trees for efficient memory authentication. In Proceedings of the Ninth Annual Symposium on High Performance Computer Architecture, February 2003.]]"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956575"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/648051.746191"},{"key":"e_1_2_1_15_1","volume-title":"Lan Gao. Fast Secure Processor for Inhibiting Software Piracty and Tampering. In 36th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"Yang Jun","year":"2003","unstructured":"Jun Yang , Youtao Zhang , and Lan Gao. Fast Secure Processor for Inhibiting Software Piracty and Tampering. In 36th Annual IEEE\/ACM International Symposium on Microarchitecture , December , 2003 .]] Jun Yang, Youtao Zhang, and Lan Gao. Fast Secure Processor for Inhibiting Software Piracty and Tampering. In 36th Annual IEEE\/ACM International Symposium on Microarchitecture, December, 2003.]]"},{"key":"e_1_2_1_16_1","first-page":"325","volume-title":"Proceedings of the 2003 Internal Conference on Code Generation and Optimization","author":"Zhang Xiangyu","year":"2003","unstructured":"Xiangyu Zhang and Rajiv Gupta . Hiding program slices for software security . In Proceedings of the 2003 Internal Conference on Code Generation and Optimization , pages 325 -- 336 , 2003 .]] Xiangyu Zhang and Rajiv Gupta. Hiding program slices for software security. In Proceedings of the 2003 Internal Conference on Code Generation and Optimization, pages 325--336, 2003.]]"}],"container-title":["ACM SIGARCH Computer Architecture News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1055626.1055629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1055626.1055629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:27Z","timestamp":1750264287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1055626.1055629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,3]]}},"alternative-id":["10.1145\/1055626.1055629"],"URL":"https:\/\/doi.org\/10.1145\/1055626.1055629","relation":{},"ISSN":["0163-5964"],"issn-type":[{"type":"print","value":"0163-5964"}],"subject":[],"published":{"date-parts":[[2005,3]]},"assertion":[{"value":"2005-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}