TAD : time side-channel attack defense of obfuscated source code
Program obfuscation is widely used to protect commercial software against reverse-engineering. However, an adversary can still download, disassemble and analyze binaries of the obfuscated code executed on an embedded System-on-Chip (SoC), and by correlating execution times to input values, extract s...
Main Authors: | Fell, Alexander, Pham, Hung Thinh, Lam, Siew-Kei |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Conference Paper |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145789 |
Similar Items
-
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01) -
Detection of Obfuscated Javascript Code Based on Abstract Syntax Trees Coloring
by: G. S. Ponomarenko, et al.
Published: (2020-06-01) -
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
by: Asma'a Mahfoud Hezam Al-Hakimi, et al.
Published: (2020-01-01) -
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
by: Daniel Dolz, et al.
Published: (2008-07-01) -
Measuring Software Obfuscation Quality–A Systematic Literature Review
by: Shouki A. Ebad, et al.
Published: (2021-01-01)