TAD : time side-channel attack defense of obfuscated source code
Program obfuscation is widely used to protect commercial software against reverse-engineering. However, an adversary can still download, disassemble and analyze binaries of the obfuscated code executed on an embedded System-on-Chip (SoC), and by correlating execution times to input values, extract s...
Saved in:
Main Authors: | Fell, Alexander, Pham, Hung Thinh, Lam, Siew-Kei |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145789 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017) -
LORA: Link obfuscation by randomization in graphs
by: Xiao, Q., et al.
Published: (2013) -
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
by: KANDAPPU, Thivya, et al.
Published: (2018) -
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
by: KANDAPPU, Thivya, et al.
Published: (2018) -
Lightweight and unobtrusive data obfuscation at IoT edge for remote inference
by: Xu, Dixing, et al.
Published: (2023)