Exploration of Reflective ASMs for Security

Publication
9th International Conference on Rigorous State Based Methods (ABZ'23)

Abstract

We show how reflective ASMs can support hardware-software binding, which can be used for copy protection, and we exploit the logic of rASMs to express desirable properties for this application.

Document

If you cannot see the document below, the PDF document is most likely not freely accessible. In this case, please try to access the document via this link.

Reference

% BibTex
@inproceedings{TongXHFS23,
  author       = {Linjie Tong and
                  Ke Xu and
                  Jiarun Hu and
                  Flavio Ferrarotti and
                  Klaus{-}Dieter Schewe},
  editor       = {Uwe Gl{\"{a}}sser and
                  Jos{\'{e}} Creissac Campos and
                  Dominique M{\'{e}}ry and
                  Philippe A. Palanque},
  title        = {Exploration of Reflective ASMs for Security},
  booktitle    = {Rigorous State-Based Methods - 9th International Conference, {ABZ}
                  2023, Nancy, France, May 30 - June 2, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14010},
  pages        = {185--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33163-3\_14},
  doi          = {10.1007/978-3-031-33163-3\_14},
  timestamp    = {Tue, 23 May 2023 09:57:42 +0200},
  biburl       = {https://dblp.org/rec/conf/zum/TongXHFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}


Related