Proceedings of the 34th Annual Computer Security Applications Conference 2018
DOI: 10.1145/3274694.3274732
|View full text |Cite
|
Sign up to set email alerts
|

Practical Integrity Protection with Oblivious Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(16 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…That is, if an SC protection is to be developed as a compiler pass, the expected hashes need to be adjusted once the binary representation of the program is finalized. For this purpose usually placeholders along with post-patching mechanisms are utilized [1]. Alternatively, a backend pass (similar to the one described in [25]) can be used to adjust placeholders.…”
Section: Self-checksumming (Sc)mentioning
confidence: 99%
See 1 more Smart Citation
“…That is, if an SC protection is to be developed as a compiler pass, the expected hashes need to be adjusted once the binary representation of the program is finalized. For this purpose usually placeholders along with post-patching mechanisms are utilized [1]. Alternatively, a backend pass (similar to the one described in [25]) can be used to adjust placeholders.…”
Section: Self-checksumming (Sc)mentioning
confidence: 99%
“…Furthermore, SC guards are susceptible to pattern matching attacks [1,2,5]. Therefore, without proper utilization of obfuscations, SC is rather easily identifiable, and perhaps defeatable.…”
Section: Self-checksumming (Sc)mentioning
confidence: 99%
“…However, we believe random selection is unrealistic. In practice, compositions rather use some heuristics [2]. In order to capture possible improvements, we resort to a heuristicbased composition of SC and OH/SROH (presented in [2]) as our baseline.…”
Section: Performancementioning
confidence: 99%
“…In practice, compositions rather use some heuristics [2]. In order to capture possible improvements, we resort to a heuristicbased composition of SC and OH/SROH (presented in [2]) as our baseline. Our aim is to measure the overhead difference between the optimized composition versus the heuristic one.…”
Section: Performancementioning
confidence: 99%
See 1 more Smart Citation