Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which segments are added in to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation technique that deobfuscates code at runtime based on a secret safely stored in hardware, along with an LLVM compiler extension for obfuscating binaries. Unlike conventional tools, our work does not rely on compiling hard-to-reverse-engineer code, but on securing a secret key. As such, it can b...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
While the resilience of software-only code obfuscation remains unclear and ultimately depends only o...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
While the resilience of software-only code obfuscation remains unclear and ultimately depends only o...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Software protection aims at protecting the integrity of software applications deployed on un-trusted...