期刊文献+

基于FPGA的软件保护体系结构研究与设计 被引量:1

Architecture research and design based on FPGA for software protection
下载PDF
导出
摘要 计算机产业现面临的一个重要问题是保证软件的使用合法性,目前很多保护方案都缺少灵活性或是有效性,为此设计一种具有灵活性特征和用户透明性的软件保护体系结构。利用现场可编程门阵列(FPGA)的可编程性和结合编译器技术,将具有完整性验证和解密的功能的FPGA放置在CPU和主存之间,执行编译器驱动的特定软件,该方法可以使体系保持灵活性。仿真实验结果表明,该体系还具有快速解密、动态认证、安全性高的特征。 One of the key problems facing the computer industry today is ensuring the validation of software usage. Many previously developed protection schemes are lack of flexibility or effectiveness. An architecture for software protection that provides for a high level of both flexibility and user transparency is proposed. By utilizing field programmable gate array' s programmability and compiler tech- nology, FPGAs which are aiming at integrity invalidating and decryption are placed between CPU and main memory. This approach can maintain the flexibility through reprogramming to carry out any compiler-driven protections that may be software-specific. Besides, the simulation results show the architecture characterizes fast decryption, dynamic validation and high security.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第7期1580-1582,共3页 Computer Engineering and Design
基金 南昌工程学院青年基金科技项目(2006KJ029)
关键词 现场可编程门阵列 体系 可编程性 安全 软件保护 field programmable gate array architecture programmability security software protection
  • 相关文献

参考文献10

  • 1FPGA[EB/OL].http://www.c114.net/keyword/FPGA.
  • 2谭貌,陈义,涂杰.软件版权保护技术的研究与分析[J].计算机应用与软件,2007,24(1):54-57. 被引量:10
  • 3International Planning and Research Corporation.Eighth annual BSA global software piracy study[EB/OL].http://www.bsa.org,2003.
  • 4Kimmo U JLrvinen,Matti T Tommiska,Jorma O Skytta.A fully pipelined memoryless 17.8 Gbps AES-128 encryptor[C].Proceedings of the ACM/SIGDA Eleventh International Symposium on Field Programmable Gate Arrays,2003:207-215.
  • 5Wurster G,Oorschot P,Somayaji A.A generic attack on checksumming-based software tamper resistance[c].Proc of IEEE Symp Security and Privacy,2005:127-138.
  • 6Kirovski D,Drinic M,Potkonjak M.Enabling trusted soRware integrity[C].Proe of the 10th Architectural Support for Programming Languages and Operating Systems,2002:108-120.
  • 7Zhuang X,Zhang T,Pande S.HIDE:An infrastructure for efficiently protecting information leakage on the address bus[C].Proc of Architectural Support for Programming Languages and Operating Systems,2004:72-84.
  • 8Eibirt A,Yip W,Chetwynd B,et al.A FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists[C].Proc of the 3rd Advanced Encryption Standard Candidate Conf,2000:13-27.
  • 9Zambreno J,Choudhary A,Simha R,et al.Flexible software protection using HW/SW code sign techniques[C].Proc of Design,Automation,and Test in Europe,2004:636-641.
  • 10Kirovski D,Drinic M,Potkonjak M.Enabling trusted soRwarc intesty[C].Proc of 10th Architectural Support for Programming Languages and Operating Systems,2002:108-120.

二级参考文献4

  • 1.中华人民共和国著作权法[Z].,2001..
  • 2科尔文(Cerven,P.)著,韩宏莲译.Cracker终结者:提供最优秀的软件保护技术,北京:清华大学出版社,2004.
  • 3安德森(Anderson R.J.)著,孙彦妍译.信息安全工程,北京:机械工业出版社,2003.
  • 4中华人民共和国计算机软件保护条例,2001.

共引文献9

同被引文献14

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部