Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.
Paul C. van OorschotAnil SomayajiGlenn WursterPublished in: IEEE Trans. Dependable Secur. Comput. (2005)
Keyphrases
- computer systems
- hardware design
- software implementation
- low cost
- hardware platforms
- real time
- embedded systems
- control software
- blue gene
- dedicated hardware
- computer hardware
- hardware software
- control unit
- hardware and software
- personal computer
- high end
- order preserving
- image processing
- massively parallel
- computing systems
- hash functions
- hardware implementation
- software tools
- software architecture
- software systems
- source code
- nearest neighbor search
- hardware architecture
- software components
- data acquisition
- operating system
- user interface
- abstraction layer