2018 IEEE 19th Latin-American Test Symposium (LATS) 2018
DOI: 10.1109/latw.2018.8349680
|View full text |Cite
|
Sign up to set email alerts
|

Defeating hardware Trojan in microprocessor cores through software obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…This strategy adds junk instructions which are not functional. For binaries, we can add no-operation instructions (NOP or 0x00) (Dalla Preda and Maggi 2017;Marcelli et al 2018). Besides, we can also add junk methods, such as adding defunct methods in Android smali codes (Dalla Preda and Maggi 2017).…”
Section: Junk Codesmentioning
confidence: 99%
“…This strategy adds junk instructions which are not functional. For binaries, we can add no-operation instructions (NOP or 0x00) (Dalla Preda and Maggi 2017;Marcelli et al 2018). Besides, we can also add junk methods, such as adding defunct methods in Android smali codes (Dalla Preda and Maggi 2017).…”
Section: Junk Codesmentioning
confidence: 99%
“…Moreover, DETON does not require any redundancy or modification to standard microprocessors. The only work proposing a similar idea is the one reported in [29] where software diversity is achieved by substituting program instructions with equivalent ones. Nevertheless, the proposal in [29] only considers sequentially-triggered change-functionality HTHs and equivalent instructions substitution is solely employed.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, our methodology does not require any redundancy or modification to target microprocessor. The only similar idea has been proposed in [17] where software diversity is achieved by substituting program instructions with equivalent ones during the fetching procedure. Nevertheless, the proposal in [17] only considers sequentially-triggered changefunctionality HTHs and equivalent instructions substitution is solely employed.…”
Section: Introduction and Related Workmentioning
confidence: 99%