Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
ASHES '24: Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware SecurityPages 68–77https://doi.org/10.1145/3689939.3695784The expansion of flip-chip technologies and a lack of backside protection make the integrated circuit (IC) vulnerable to certain classes of physical attacks mounted from the IC's backside. Laser-assisted probing, electromagnetic, and body-biasing ...
- keynoteMarch 2018
Code Obfuscation: Why is This Still a Thing?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 173–174https://doi.org/10.1145/3176258.3176342Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem ...
- research-articleDecember 2016
Comparing the effectiveness of commercial obfuscators against MATE attacks
SSPREW '16: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse EngineeringArticle No.: 8, Pages 1–11https://doi.org/10.1145/3015135.3015143The ability to protect software from malicious reverse engineering remains a challenge faced by commercial software companies who invest a large amount of resources in the development of their software product. In order to protect their investment from ...
- ArticleNovember 2012
Design of Monitor and Protect Circuits against FIB Attack on Chip Security
CIS '12: Proceedings of the 2012 Eighth International Conference on Computational Intelligence and SecurityPages 530–533https://doi.org/10.1109/CIS.2012.125As information security chips are more widely used in the field of information security, the security of chips becomes increasingly important, which has also been a hot research field of information security. With the advances in technology, a chip-...
- research-articleJune 2011
Complexity and the challenges of securing SoCs
DAC '11: Proceedings of the 48th Design Automation ConferencePages 328–331https://doi.org/10.1145/2024724.2024803There is a growing need to secure cryptographic keys and other secrets on SoCs and other large ASICs. For designers, smaller geometries make it more difficult to predict the precise physical and analog properties of digital logic blocks. In addition, ...
- chapterNovember 2009
An Improved Recovery Algorithm for Decayed AES Key Schedule Images
Selected Areas in CryptographyNovember 2009, Pages 215–230https://doi.org/10.1007/978-3-642-05445-7_14A practical algorithm that recovers AES key schedules from decayed memory images is presented. Halderman et al. [1] established this recovery capability, dubbed the cold-boot attack, as a serious vulnerability for several widespread software-based ...
- ArticleAugust 2009
"Glitch Logic" and Applications to Computing and Information Security
BLISS '09: Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for SecurityPages 107–112https://doi.org/10.1109/BLISS.2009.1This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing ...
- research-articleOctober 2008
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
VMSec '08: Proceedings of the 1st ACM workshop on Virtual machine securityPages 45–48https://doi.org/10.1145/1456482.1456490There are many practical situations in which, by policy, software is supposed to run on a specific hardware instance. This is not only useful to combat piracy, but also in national security situations, such as a battlefield loss of critical technology, ...