Information Security

We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.

[1]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[2]  Stuart Haber,et al.  Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .

[3]  Sean W. Smith,et al.  Using a High-Performance, Programmable Secure Coprocessor , 1998, Financial Cryptography.

[4]  Jan Willemson,et al.  Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.

[5]  Naomaru Itoi Secure Coprocessor Integration with Kerberos V5 , 2000, USENIX Security Symposium.

[6]  David R. Safford,et al.  Practical Private Information Retrieval with Secure Coprocessors , 2000 .

[7]  Simon Shiu,et al.  Encryption and key management in a SAN , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..

[8]  Marco Casassa Mont,et al.  Trust services: a framework for service-based solutions , 2002, Proceedings 26th Annual International Computer Software and Applications.

[9]  Ana Ferreira,et al.  Towards accountability for Electronic Patient Records , 2003, 16th IEEE Symposium Computer-Based Medical Systems, 2003. Proceedings..

[10]  Simon Shiu,et al.  Hardware Security Appliances for Trust , 2003, iTrust.

[11]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.