Sign Up to like & get
recommendations!
0
Published in 2025 at "Higher Education"
DOI: 10.1007/s10734-024-01373-0
Abstract: This article introduces the concept of “care obfuscation”, developed from interviews with 32 UK-based academic mothers about their experience of the transition to parenthood. Care obfuscation refers to the workplace conduct of hiding, underestimating or…
read more here.
Keywords:
cruel optimism;
care;
obfuscation;
based academic ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Applied Network Science"
DOI: 10.1007/s41109-025-00733-8
Abstract: Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection. Consequently, attackers must…
read more here.
Keywords:
binary code;
analysis;
code;
graph based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Electronics Letters"
DOI: 10.1049/el.2017.1329
Abstract: For protecting an intellectual property (IP) core, it must be harder to reverse engineer. Structural obfuscation can play an important role in achieving this goal. A novel structural obfuscation methodology during architectural synthesis using multiple…
read more here.
Keywords:
using hlt;
methodology;
architectural synthesis;
synthesis using ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3174349
Abstract: This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register…
read more here.
Keywords:
dna impression;
chromosomal dna;
obfuscation;
structural obfuscation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3181373
Abstract: Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality. Android app developers often employ obfuscation techniques to…
read more here.
Keywords:
flow obfuscation;
obfuscation;
deoptfuscator;
app ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3244902
Abstract: Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper…
read more here.
Keywords:
toward rtl;
obfuscation;
retrustfsm;
rtl hardware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2025.3601528
Abstract: Traditional defenses against Distributed Denial of Service and link flooding attack in Internet of Things (IoT) networks, such as static network topology obfuscation and traffic engineering, suffer from critical limitations. These include high computational overhead…
read more here.
Keywords:
topology obfuscation;
iot networks;
obfuscation;
topology ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2649520
Abstract: The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information. Previous efforts involving code obfuscation provide some additional security against reverse- engineering of programs,…
read more here.
Keywords:
hybrid obfuscation;
obfuscation protect;
protect disclosure;
disclosure attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2024.3466810
Abstract: With advances in technology scaling and globalization of the semiconductor industry, the vulnerability of analog integrated circuits (ICs) to reverse-engineering-based attacks, intellectual property theft, and unauthorized access has increased. Prior state-of-the-art analog deobfuscation techniques, such…
read more here.
Keywords:
oracle;
analog security;
enhancing analog;
obfuscation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2024.3383661
Abstract: In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in…
read more here.
Keywords:
space hard;
obfuscation;
cloud;
shared cache ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2018.2890616
Abstract: Intellectual property protection techniques face a challenging task in countering a physical attack by reverse engineering the netlist of an embedded integrated circuit. An attacker can extract sensitive information with image tools by processing microphotographs…
read more here.
Keywords:
reverse engineering;
obfuscation;
standard cell;
reverse ... See more keywords