Affiliation:
1. Department of Computer Science and Applied mathematics. Weizmann Institute of Science, Rehovot, Israel
2. Bell Communications Research, 445 South Street, Morristown, New Jercy
Abstract
Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc methods for protection, but the problem as a whole has not received the theoretical treatment it deserves. In this paper, we provide theoretical treatment of software protection. We reduce the problem of software protection to the problem of efficient simulation on
oblivious
RAM.
A machine is
oblivious
if thhe sequence in which it accesses memory locations is equivalent for any two inputs with the same running time. For example, an oblivious Turing Machine is one for which the movement of the heads on the tapes is identical for each computation. (Thus, the movement is independent of the actual input.)
What is the slowdown in the running time of a machine, if it is required to be oblivious?
In 1979, Pippenger and Fischer showed how a two-tape
oblivious
Turing Machine can simulate, on-line, a one-tape Turing Machine, with a logarithmic slowdown in the running time. We show an analogous result for the random-access machine (RAM) model of computation. In particular, we show how to do an on-line simulation of an arbitrary RAM by a probabilistic
oblivious
RAM with a polylogaithmic slowdown in the running time. On the other hand, we show that a logarithmic slowdown is a lower bound.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference23 articles.
1. AHO A. V. HOPCROFr J. E. AND ULLMAN J. D. 1974. The Design and Analysis of Computer Algorithms Addison-Wesley Reading Pa. AHO A. V. HOPCROFr J. E. AND ULLMAN J. D. 1974. The Design and Analysis of Computer Algorithms Addison-Wesley Reading Pa.
2. Halvers and expanders (switching)
3. Microprocessor for executing encrypted programs;BEST R.;US Patent,1979
Cited by
967 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献