Back to Results
First PageMeta Content
Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science


A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem
Add to Reading List

Document Date: 2012-06-05 18:18:00


Open Document

File Size: 295,63 KB

Share Result on Facebook

City

Livermore / /

Company

Lockheed Martin Corporation / Sandia National Laboratories / Sandia Corporation / /

Country

United States / /

/

Facility

Laboratory Directed Research and Development / Massachusetts Institute of Technology / store O / /

IndustryTerm

software obfuscation techniques / software protection problem / solution using software diversity / inter-twining software functionality / software protection / software protection scheme / software obfuscation / software vendors / software license / to multiple systems / illegal software replication / software protection mechanism / uncontrollable manufacturing characteristics / software tampering / owned subsidiary / software / polynomial time algorithm / secure obfuscation algorithm / trusted hardware / software watermarking / correct device / secure software protection schemes / computing / authentication tool / software industry billions / resistant trusted hardware / hardware device / protected software / software developer / feasible offline solution / possible applications / online server / trusted computing board / exhaustive search / software functionality / pirated software / physical systems / software analysis / Software piracy / peripheral device / /

MarketIndex

PRP / /

Organization

Massachusetts Institute of Technology / U.S. Department of Energy’s National Nuclear Security Administration / /

Person

Boaz Barak / John Solis Sandia / /

Position

tackle / tape head / software developer / /

Product

PUFs / /

ProvinceOrState

Massachusetts / /

Technology

FPGA / cryptography / RAM / polynomial time algorithm / PUF technologies / SRAM / IPP algorithm / provably secure obfuscation algorithm / /

SocialTag