This Phase II proposal extends the technique developed during Phase I for protecting CPI into a commercially viable and generally applicable source-to-source transformation engine. In addition, we expand the Phase I approach to support high-performance secure computation through careful division of tasks, between a slower secured processor, and multiple high-performance general-purpose COTS processors, through the process of secure outsourcing.
Keywords: Anti-Tamper (At), Software Protection, Encryption, Data Splitting, Security Processor, Cpi, High Performance