While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis. Almost no systematic research has been done on the interplay between hardware and software based protection mechanism. In this paper, we propose modifications to Intel's AES-NI instruction set in order to make it suitable for application in software protection scenarios and demonstrate its integration into a control flow obfuscation scheme. Our novel approach provides strong hardware-software binding and restricts the attack context to pure dynamic analysis - two major limiti...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outs...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of cod...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circui...
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circui...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outs...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of cod...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circui...
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circui...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
The quest of low production cost and short time-tomarket, as well as the complexity of modern integr...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...