@inproceedings{chen2002oblivious, author = {Chen, Yuqun and Venkatesan, Ramarathnam and Cary, Matthew and Pang, Ruoming and Sinha, Saurabh and Jakubowski, Mariusz}, title = {Oblivious hashing: A stealthy software integrity verification primitive}, booktitle = {Information Hiding 2002}, year = {2002}, month = {October}, abstract = {We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.}, url = {http://approjects.co.za/?big=en-us/research/publication/oblivious-hashing-a-stealthy-software-integrity-verification-primitive/}, edition = {Information Hiding 2002}, }