Tamper Resistant Software Design and Implementation: IVK

Paper1: Make software immune to observation and modification.

Tamper-resistance using Integrity Verification Kernels:

  • segments of code which are self-modifying, self-decrypting and installation unique.
  • code segments communicates with other such code, creating an interlocking trust model.

Threats:

  • breach communication access controls to attack the system;

  • computer virus;

  • attacker as insider: may modify at will.


  1. Tamper Resistant Software Design and Implementation. 1999. ↩
Created Aug 13, 2019 // Last Updated Aug 13, 2019

If you could revise
the fundmental principles of
computer system design
to improve security...

... what would you change?