Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
暂无分享,去创建一个
[1] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[2] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[3] Michael J. Wiener,et al. DES is not a Group , 1992, CRYPTO.
[4] Patrick Schaumont,et al. Offline Hardware/Software Authentication for Reconfigurable Platforms , 2006, CHES.
[5] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[6] G.-J. Schrijen,et al. Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection , 2007, 2007 International Conference on Field Programmable Logic and Applications.
[7] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[8] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[9] Mikhail J. Atallah,et al. A Survey of Anti-Tamper Technologies , 2004 .