Results 31 to 40 of about 621 (141)
Development and Evaluation of Hardware Obfuscation Benchmarks [PDF]
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99.
Sarah Amir +6 more
openaire +1 more source
Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn ...
Aldo Hernandez-Suarez +6 more
doaj +1 more source
De la logique à l’algorithme : la traduction dans le design de programmes
What makes machine logic so difficult to understand for users ? It seems as if we attribute to machines the utopian potential of unifying all forms of logic into one single binary model.
Kim Sacks
doaj +1 more source
Towards cognitive obfuscation [PDF]
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasures against reversing are evaluated solely against mathematical models.
Wiesen, Carina +7 more
openaire +2 more sources
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj +1 more source
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao +5 more
doaj +1 more source
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier +3 more
doaj +1 more source
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi +3 more
doaj +1 more source
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi +2 more
doaj +1 more source
CodeTrolley: Hardware-Assisted Control Flow Obfuscation
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which ...
Boskov, Novak +2 more
openaire +2 more sources

