Measuring software obfuscation quality–a systematic literature review

SA Ebad, AA Darem, JH Abawajy - IEEE Access, 2021 - ieeexplore.ieee.org
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

On the difficulty of FSM-based hardware obfuscation

M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
In today's Integrated Circuit (IC) production chains, a designer's valuable Intellectual
Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To …

Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains

Y Shi, T Luo, J Liang, MH Au… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain systems enable new applications, such as cryptocurrencies and smart contracts,
using decentralized consensus without trusted authorities. A number of blockchain systems …

Hardware obfuscation and logic locking: A tutorial introduction

T Hoque, RS Chakraborty, S Bhunia - IEEE Design & Test, 2020 - ieeexplore.ieee.org
If you are designing or integrating hardware IP blocks into your designs, and you are using
common global supply chains, then reading this overview article on how to protect your IP …

Automated deobfuscation of Android native binary code

Z Kan, H Wang, L Wu, Y Guo, DX Luo - arxiv preprint arxiv:1907.06828, 2019 - arxiv.org
With the popularity of Android apps, different techniques have been proposed to enhance
app protection. As an effective approach to prevent reverse engineering, obfuscation can be …

On the Malicious Potential of **linx's Internal Configuration Access Port (ICAP)

N Albartus*, M Ender*, JN Möller*, M Fyrbiak… - ACM Transactions on …, 2024 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) have become increasingly popular in computing
platforms. With recent advances in bitstream format reverse engineering, the scientific …

TAD: Time side-channel attack defense of obfuscated source code

A Fell, HT Pham, SK Lam - Proceedings of the 24th Asia and South …, 2019 - dl.acm.org
Program obfuscation is widely used to protect commercial software against reverse-
engineering. However, an adversary can still download, disassemble and analyze binaries …

LifeLine for FPGA protection: Obfuscated cryptography for real-world security

F Stolz, N Albartus, J Speith, S Klix… - IACR Transactions on …, 2021 - icscm.ub.rub.de
Over the last decade attacks have repetitively demonstrated that bitstream protection for
SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence …

Tunnel FET ambipolarity‐based energy efficient and robust true random number generator against reverse engineering attacks

A Japa, MK Majumder, SK Sahoo… - IET Circuits, Devices & …, 2019 - Wiley Online Library
This study presents a true random number generator (TRNG) harvesting random bits from
delay variations of ambipolarity‐based ring oscillator, designed using 20 nm InAs Tunnel …