Articles with "obfuscation" as a keyword



Photo by quinguyen from unsplash

Protecting IP core during architectural synthesis using HLT-based obfuscation

Sign Up to like & get
recommendations!
Published in 2017 at "Electronics Letters"

DOI: 10.1049/el.2017.1329

Abstract: For protecting an intellectual property (IP) core, it must be harder to reverse engineer. Structural obfuscation can play an important role in achieving this goal. A novel structural obfuscation methodology during architectural synthesis using multiple… read more here.

Keywords: using hlt; methodology; architectural synthesis; synthesis using ... See more keywords
Photo by nci from unsplash

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3174349

Abstract: This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register… read more here.

Keywords: dna impression; chromosomal dna; obfuscation; structural obfuscation ... See more keywords
Photo by usgs from unsplash

Deoptfuscator: Defeating Advanced Control-flow Obfuscation Using Android Runtime (ART)

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181373

Abstract: Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality. Android app developers often employ obfuscation techniques to… read more here.

Keywords: flow obfuscation; obfuscation; deoptfuscator; app ... See more keywords
Photo by tbyphoto from unsplash

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3244902

Abstract: Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper… read more here.

Keywords: toward rtl; obfuscation; retrustfsm; rtl hardware ... See more keywords
Photo from wikipedia

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2649520

Abstract: The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information. Previous efforts involving code obfuscation provide some additional security against reverse- engineering of programs,… read more here.

Keywords: hybrid obfuscation; obfuscation protect; protect disclosure; disclosure attacks ... See more keywords
Photo by thisisengineering from unsplash

Defeating Silicon Reverse Engineering Using a Layout-Level Standard Cell Camouflage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2018.2890616

Abstract: Intellectual property protection techniques face a challenging task in countering a physical attack by reverse engineering the netlist of an embedded integrated circuit. An attacker can extract sensitive information with image tools by processing microphotographs… read more here.

Keywords: reverse engineering; obfuscation; standard cell; reverse ... See more keywords
Photo by celpax from unsplash

A Lightweight and Machine-Learning-Resistant PUF Using Obfuscation-Feedback-Shift-Register

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3193002

Abstract: Physical Unclonable Function (PUF) is a lightweight hardware security primitive and suitable for device authentication in the Internet of Things. However, each strong PUF instance must store at least 106 reliable challenge-response pairs in the… read more here.

Keywords: feedback shift; obfuscation; puf; shift register ... See more keywords
Photo by thisisengineering from unsplash

Generating Effective Software Obfuscation Sequences With Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3041655

Abstract: Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics unchanged. So far, developers heavily rely on obfuscation to harden their products and… read more here.

Keywords: effective software; software obfuscation; obfuscation; reinforcement learning ... See more keywords
Photo by dawson2406 from unsplash

Model of Execution Trace Obfuscation Between Threads

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3123159

Abstract: Advanced reverse analysis tools have significantly improved the ability of attackers to crack software via dynamic analysis techniques, such as symbol execution and taint analysis. These techniques are widely used in malicious fields such as… read more here.

Keywords: execution trace; trace obfuscation; analysis; obfuscation ... See more keywords
Photo from wikipedia

Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2016.2601067

Abstract: The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy against reverse engineering is hardware obfuscation. In this paper, we investigate physical obfuscation techniques, which… read more here.

Keywords: logic level; hardware; device logic; obfuscation ... See more keywords
Photo by jontyson from unsplash

Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2738600

Abstract: This paper proposes a novel technique for hardware obfuscation termed dynamic functional obfuscation. Hardware obfuscation refers to a set of countermeasures used against IC counterfeiting and illegal overproduction. Traditionally, obfuscation encrypts semiconductor circuits using key… read more here.

Keywords: tex math; obfuscation; time; inline formula ... See more keywords