메뉴 건너뛰기




Volumn , Issue , 2004, Pages 292-302

Hardware assisted control flow obfuscation for embedded processors

Author keywords

Control Flow Graph; Obfuscation

Indexed keywords

COMPUTER HARDWARE; COMPUTER SOFTWARE; CRYPTOGRAPHY; EMBEDDED SYSTEMS; REVERSE ENGINEERING; SECURITY OF DATA;

EID: 29144444415     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1023833.1023873     Document Type: Conference Paper
Times cited : (66)

References (22)
  • 2
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • University of Auckland
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 5
    • 12844286476 scopus 로고    scopus 로고
    • DS5002FP secure microprocessor chip data sheet
    • "DS5002FP secure microprocessor chip data sheet," Dallas Semiconductor.
    • Dallas Semiconductor
  • 6
    • 0038650645 scopus 로고    scopus 로고
    • The trustno 1 cryptoprocessor concept
    • Purdue Univ.
    • Markus, Kuhn, "The TrustNo 1 Cryptoprocessor Concept," CS555 Report, Purdue Univ. 1997.
    • (1997) CS555 Report
    • Markus, K.1
  • 7
    • 0018995481 scopus 로고
    • Preventing software piracy with crypto-microprocessors
    • February
    • Robert M. Best. Preventing software piracy with crypto-microprocessors. In Proceedings of IEEE Spring COMPCON 80, page 466, February 1980.
    • (1980) Proceedings of IEEE Spring COMPCON , vol.80 , pp. 466
    • Best, R.M.1
  • 11
    • 84944392287 scopus 로고    scopus 로고
    • Fast secure processor for inhibiting software piracy and tampering
    • Yang, Y.Zhang, L.Gao, "Fast Secure Processor for Inhibiting Software Piracy and Tampering," MICRO'03.
    • MICRO'03
    • Yang1    Zhang, Y.2    Gao, L.3
  • 12
    • 84944412608 scopus 로고    scopus 로고
    • Efficient memory integrity verification and encryption for secure processors
    • E.Suh, D.Clarke, B.Gassend, M.v.Dijk, S.Devadas, "Efficient Memory Integrity Verification and Encryption for Secure Processors", MICRO'03.
    • MICRO'03
    • Suh, E.1    Clarke, D.2    Gassend, B.3    Dijk, M.V.4    Devadas, S.5
  • 14
    • 0032180824 scopus 로고    scopus 로고
    • Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
    • M.G.Kuhn, "Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP," IEEE Trans. on Computers, Vol.47,No.10, pp.1153-1157, 1998.
    • (1998) IEEE Trans. on Computers , vol.47 , Issue.10 , pp. 1153-1157
    • Kuhn, M.G.1
  • 17
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O.Goldreich, R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. of the ACM, Vol.43,No.3, 1996.
    • (1996) J. of the ACM , vol.43 , Issue.3
    • Goldreich, O.1    Ostrovsky, R.2
  • 18
    • 0003465202 scopus 로고    scopus 로고
    • The simplescalar tool set version 2.0
    • Univ. of Wisconsin-Madison, May
    • Doug Burger and Todd M. Austin. "The SimpleScalar Tool Set Version 2.0," TR. 1342, Univ. of Wisconsin-Madison, May 1997.
    • (1997) TR , vol.1342
    • Burger, D.1    Austin, T.M.2
  • 20
    • 0007700727 scopus 로고    scopus 로고
    • Intel Corporation, "Intel Random Number Generator," http://developer.intel.com/design/chipsets/rng/techbrief.pdf, 1999.
    • (1999) Intel Random Number Generator


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.