Sciweavers

USS
2004

Side Effects Are Not Sufficient to Authenticate Software

14 years 2 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on machine-specific computations, incorporating side effects that cannot be simulated quickly. The system is vulnerable to a novel attack, which we call a substitution attack. We implement a successful attack on Genuinity, and further argue this class of schemes are not only impractical but unlikely to succeed without trusted hardware.
Umesh Shankar, Monica Chew, J. D. Tygar
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2004
Where USS
Authors Umesh Shankar, Monica Chew, J. D. Tygar
Comments (0)