Tamper resistance mechanisms for secure embedded systems

S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

An advanced hybrid peer-to-peer botnet

P Wang, S Sparks, CC Zou - IEEE Transactions on Dependable …, 2008 - ieeexplore.ieee.org
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …

Ensuring distributed accountability for data sharing in the cloud

S Sundareswaran, A Squicciarini… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data are usually …

Security in building automation systems

W Granzer, F Praus, W Kastner - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Building automation systems are traditionally concerned with the control of heating,
ventilation, and air conditioning, as well as lighting and shading, systems. They have their …

Secure embedded processing through hardware-assisted run-time monitoring

D Arora, S Ravi, A Raghunathan… - Design, Automation and …, 2005 - ieeexplore.ieee.org
Security is emerging as an important concern in embedded system design. The security of
embedded systems is often compromised due to vulnerabilities in" trusted" software that they …

A generic attack on checksumming-based software tamper resistance

G Wurster, PC Van Oorschot… - 2005 IEEE Symposium …, 2005 - ieeexplore.ieee.org
Self-checking software tamper resistance mechanisms employing checksums, including
advanced systems as recently proposed by Chang and Atallah (2002) and Horne et …

Information hiding in software with mixed boolean-arithmetic transforms

Y Zhou, A Main, YX Gu, H Johnson - International Workshop on …, 2007 - Springer
As increasingly powerful software analysis and attack tools arise, we need increasingly
potent software protections. We generate an unlimited supply of obscuring transforms via …

Speculation invariance (invarspec): Faster safe execution through program analysis

ZN Zhao, H Ji, M Yan, J Yu, CW Fletcher… - 2020 53rd Annual …, 2020 - ieeexplore.ieee.org
Many hardware-based defense schemes against speculative execution attacks use special
mechanisms to protect instructions while speculative, and lift the mechanisms when the …