Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 2014
DOI: 10.1145/2556464.2556469
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding

Abstract: Software programs are prone to reverse-engineering. Protection usually consists either in obfuscation or Randomized Instruction Set Emulation (RISE). In this article, we explore a mixed software/hardware RISE suitable for embedded systems. This solution is very easy to implement on any open CPU core (LEON, openRISC, LatticeMicro32, etc.), as it implies only localized changes at the latest stage of the code execution hardware, which makes Dallas and DMA attacks unsuccessful. Similarly, alternations in the softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Compared to robust but costly modern ciphers, most of them are based on simple substitution ciphers for lower overhead. Both hardware [5,7,8] and software [3,4,6] implementations have been studied. Some methods utilize the characteristics of the target instruction set [5] .…”
Section: Protection Against Reverse Engineering and Instruction Set Rmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared to robust but costly modern ciphers, most of them are based on simple substitution ciphers for lower overhead. Both hardware [5,7,8] and software [3,4,6] implementations have been studied. Some methods utilize the characteristics of the target instruction set [5] .…”
Section: Protection Against Reverse Engineering and Instruction Set Rmentioning
confidence: 99%
“…Some methods utilize the characteristics of the target instruction set [5] . Some other methods rely on stream ciphers [4,8] , whose characteristics are closer to those of memory encryption: higher safety but higher cost.…”
Section: Protection Against Reverse Engineering and Instruction Set Rmentioning
confidence: 99%
See 1 more Smart Citation
“…Danger at al. [5] introduce a new instruction to selectively randomize parts of a program. Closer to us, Hiscock et al [10] propose a scheme that encrypt the whole application using a stream cipher.…”
Section: Introductionmentioning
confidence: 99%
“…ASIST [29] decrypts instructions in hardware using a simple XOR cipher, which could make it trivial to derive its encryption key. In [30] a stream cipher is used to encrypt instructions with a seed value that can be updated at run-time.…”
Section: Introductionmentioning
confidence: 99%