SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation [PDF]
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly focus on functional locking of a design to prevent black-box usage ...
Prabuddha Chakraborty +2 more
semanticscholar +1 more source
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco +2 more
core +2 more sources
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Interlocking obfuscation for anti-tamper hardware [PDF]
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry
Avinash R. Desai +4 more
openaire +1 more source
On the Security Goals of White-Box Cryptography
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock +3 more
doaj +1 more source
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier +3 more
core +1 more source
Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan +3 more
core +1 more source
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
In the quest of vision-sensors-on-chip: Pre-processing sensors for data reduction [PDF]
This paper shows that the implementation of vision systems benefits from the usage of sensing front-end chips with embedded pre-processing capabilities - called CVIS.
Brea Sánchez, Víctor +4 more
core +1 more source

