Results 31 to 40 of about 621 (141)

Development and Evaluation of Hardware Obfuscation Benchmarks [PDF]

open access: yesJournal of Hardware and Systems Security, 2018
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99.
Sarah Amir   +6 more
openaire   +1 more source

Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks

open access: yesApplied Sciences, 2022
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn ...
Aldo Hernandez-Suarez   +6 more
doaj   +1 more source

De la logique à l’algorithme : la traduction dans le design de programmes

open access: yesAppareil, 2022
What makes machine logic so difficult to understand for users ? It seems as if we attribute to machines the utopian potential of unifying all forms of logic into one single binary model.
Kim Sacks
doaj   +1 more source

Towards cognitive obfuscation [PDF]

open access: yesProceedings of the 24th Asia and South Pacific Design Automation Conference, 2019
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasures against reversing are evaluated solely against mathematical models.
Wiesen, Carina   +7 more
openaire   +2 more sources

Enhancing the security of memory in cloud infrastructure through in‐phase change memory data randomisation

open access: yesIET Computers & Digital Techniques, 2021
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj   +1 more source

NC-ROLL-FIA: Negative capacitance FET based designs for robust logic locking against fault injection attacks enabling trustworthy hardware for edge AI devices

open access: yesResults in Engineering
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao   +5 more
doaj   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4

open access: yesIEEE Access, 2020
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi   +3 more
doaj   +1 more source

TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks

open access: yesIEEE Access
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi   +2 more
doaj   +1 more source

CodeTrolley: Hardware-Assisted Control Flow Obfuscation

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which ...
Boskov, Novak   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy