Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
ASHES '24: Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware SecurityPages 68–77https://doi.org/10.1145/3689939.3695784The expansion of flip-chip technologies and a lack of backside protection make the integrated circuit (IC) vulnerable to certain classes of physical attacks mounted from the IC's backside. Laser-assisted probing, electromagnetic, and body-biasing ...
- keynoteMarch 2018
Code Obfuscation: Why is This Still a Thing?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 173–174https://doi.org/10.1145/3176258.3176342Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem ...
- research-articleDecember 2016
Comparing the effectiveness of commercial obfuscators against MATE attacks
SSPREW '16: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse EngineeringArticle No.: 8, Pages 1–11https://doi.org/10.1145/3015135.3015143The ability to protect software from malicious reverse engineering remains a challenge faced by commercial software companies who invest a large amount of resources in the development of their software product. In order to protect their investment from ...
- research-articleJune 2011
Complexity and the challenges of securing SoCs
DAC '11: Proceedings of the 48th Design Automation ConferencePages 328–331https://doi.org/10.1145/2024724.2024803There is a growing need to secure cryptographic keys and other secrets on SoCs and other large ASICs. For designers, smaller geometries make it more difficult to predict the precise physical and analog properties of digital logic blocks. In addition, ...
- research-articleOctober 2008
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
VMSec '08: Proceedings of the 1st ACM workshop on Virtual machine securityPages 45–48https://doi.org/10.1145/1456482.1456490There are many practical situations in which, by policy, software is supposed to run on a specific hardware instance. This is not only useful to combat piracy, but also in national security situations, such as a battlefield loss of critical technology, ...