2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2022
DOI: 10.1109/dsn53405.2022.00053
|View full text |Cite
|
Sign up to set email alerts
|

ERIC: An Efficient and Practical Software Obfuscation Framework

Abstract: Modern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. However, these executables are still vulnerable to reverse engineering techniques that can extract secret information from programs (e.g., an algorithm, cryptographic keys), violating the IP rights and potentially exposing the trade secrets of the software developer. Malicious parties can (i) statically analyze the disassembly of the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…However, using the same execution unit for executing the proposed software mechanism could make detection difficult in hardware-based attacks/errors or can cause serious overhead to the execution unit to run the secure program. In addition to these studies a number of hybrid approaches comprised of hardware and software components are proposed [19], [20]. These studies likewise require validation logic in the execution unit or require custom compiler to incorporate hardware-specific opcodes.…”
Section: Related Work and Threat Modelmentioning
confidence: 99%
“…However, using the same execution unit for executing the proposed software mechanism could make detection difficult in hardware-based attacks/errors or can cause serious overhead to the execution unit to run the secure program. In addition to these studies a number of hybrid approaches comprised of hardware and software components are proposed [19], [20]. These studies likewise require validation logic in the execution unit or require custom compiler to incorporate hardware-specific opcodes.…”
Section: Related Work and Threat Modelmentioning
confidence: 99%