Articles with "obfuscation" as a keyword



Agency and cruel optimism in the care obfuscations of UK-based academic mothers

Sign Up to like & get
recommendations!
Published in 2025 at "Higher Education"

DOI: 10.1007/s10734-024-01373-0

Abstract: This article introduces the concept of “care obfuscation”, developed from interviews with 32 UK-based academic mothers about their experience of the transition to parenthood. Care obfuscation refers to the workplace conduct of hiding, underestimating or… read more here.

Keywords: cruel optimism; care; obfuscation; based academic ... See more keywords

Identifying obfuscated code through graph-based semantic analysis of binary code

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Network Science"

DOI: 10.1007/s41109-025-00733-8

Abstract: Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection. Consequently, attackers must… read more here.

Keywords: binary code; analysis; code; graph based ... See more keywords

Protecting IP core during architectural synthesis using HLT-based obfuscation

Sign Up to like & get
recommendations!
Published in 2017 at "Electronics Letters"

DOI: 10.1049/el.2017.1329

Abstract: For protecting an intellectual property (IP) core, it must be harder to reverse engineer. Structural obfuscation can play an important role in achieving this goal. A novel structural obfuscation methodology during architectural synthesis using multiple… read more here.

Keywords: using hlt; methodology; architectural synthesis; synthesis using ... See more keywords

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3174349

Abstract: This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register… read more here.

Keywords: dna impression; chromosomal dna; obfuscation; structural obfuscation ... See more keywords

Deoptfuscator: Defeating Advanced Control-flow Obfuscation Using Android Runtime (ART)

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181373

Abstract: Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality. Android app developers often employ obfuscation techniques to… read more here.

Keywords: flow obfuscation; obfuscation; deoptfuscator; app ... See more keywords

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3244902

Abstract: Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper… read more here.

Keywords: toward rtl; obfuscation; retrustfsm; rtl hardware ... See more keywords

Toward Dynamic Topology Obfuscation for IoT Networks With Evolutionary Defense

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3601528

Abstract: Traditional defenses against Distributed Denial of Service and link flooding attack in Internet of Things (IoT) networks, such as static network topology obfuscation and traffic engineering, suffer from critical limitations. These include high computational overhead… read more here.

Keywords: topology obfuscation; iot networks; obfuscation; topology ... See more keywords

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2649520

Abstract: The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information. Previous efforts involving code obfuscation provide some additional security against reverse- engineering of programs,… read more here.

Keywords: hybrid obfuscation; obfuscation protect; protect disclosure; disclosure attacks ... See more keywords

Enhancing Analog IC Security Using Randomized Obfuscation Circuits

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2024.3466810

Abstract: With advances in technology scaling and globalization of the semiconductor industry, the vulnerability of analog integrated circuits (ICs) to reverse-engineering-based attacks, intellectual property theft, and unauthorized access has increased. Prior state-of-the-art analog deobfuscation techniques, such… read more here.

Keywords: oracle; analog security; enhancing analog; obfuscation ... See more keywords

Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2024.3383661

Abstract: In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in… read more here.

Keywords: space hard; obfuscation; cloud; shared cache ... See more keywords

Defeating Silicon Reverse Engineering Using a Layout-Level Standard Cell Camouflage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2018.2890616

Abstract: Intellectual property protection techniques face a challenging task in countering a physical attack by reverse engineering the netlist of an embedded integrated circuit. An attacker can extract sensitive information with image tools by processing microphotographs… read more here.

Keywords: reverse engineering; obfuscation; standard cell; reverse ... See more keywords