Proceedings of the 2010 Workshop on Interaction Between Compilers and Computer Architecture 2010
DOI: 10.1145/1739025.1739038
|View full text |Cite
|
Sign up to set email alerts
|

Program differentiation

Abstract: Mobile electronics are undergoing a convergence of formerly multiple dedicated-application devices into a single programmable device -the smart phone. The programmability of these devices increases their vulnerability to malicious attack. In this paper, we propose a new malware management system that seeks to use program differentiation to reduce the propagation of malware when a software vulnerability exists. By modifying aspects of the application control flow, we allow portions of an application executable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…In addition to the reduction of code length, the IRF can provide randomization of a subset of the instructions [15] . It is possible to protect software from analysis by arbitrarily shuffling the mapping from indices to IRF instructions.…”
Section: Using Irf For Anti-tamperingmentioning
confidence: 99%
See 4 more Smart Citations
“…In addition to the reduction of code length, the IRF can provide randomization of a subset of the instructions [15] . It is possible to protect software from analysis by arbitrarily shuffling the mapping from indices to IRF instructions.…”
Section: Using Irf For Anti-tamperingmentioning
confidence: 99%
“…If the goal of the IRF is tamper resistance, it might be a bad idea to simply put the most frequent instructions in it. Unfortunately, the evaluation of these risks was not presented in [15] .…”
Section: Using Irf For Anti-tamperingmentioning
confidence: 99%
See 3 more Smart Citations