2021 58th ACM/IEEE Design Automation Conference (DAC) 2021
DOI: 10.1109/dac18074.2021.9586278
|View full text |Cite
|
Sign up to set email alerts
|

Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…In [1] author use anonymous authentication to preserving location privacy using blind signature. In [2] author propose MIMOSA, a system that identifies a small set of "covering" tool configurations that collectively defeat most malware samples with increased efficiency In [3] study how bots can influence the opinion, finding which parameters are playing a role in shrinking or coalescing the communities, and finally logically proving the effectiveness of each of the hypotheses.In [4] conclude that the reassembleable disassembly rewriting yields better scalability in comparison to lifting to an intermediate representation and performing a full translation.In [5] approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture.…”
Section: Literature Reviewmentioning
confidence: 77%
“…In [1] author use anonymous authentication to preserving location privacy using blind signature. In [2] author propose MIMOSA, a system that identifies a small set of "covering" tool configurations that collectively defeat most malware samples with increased efficiency In [3] study how bots can influence the opinion, finding which parameters are playing a role in shrinking or coalescing the communities, and finally logically proving the effectiveness of each of the hypotheses.In [4] conclude that the reassembleable disassembly rewriting yields better scalability in comparison to lifting to an intermediate representation and performing a full translation.In [5] approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture.…”
Section: Literature Reviewmentioning
confidence: 77%
“…Moreover, Rev.ng heavily relies on code pointers for identifying function entry points and leverages value-set analysis for a more precise value boundary tracking. [20] III. APPROACH Mutation analysis has been widely studied to evaluate the effectiveness and quality of test suites concerning code coverage and semantic integrity of program.…”
Section: B Binary Rewritingmentioning
confidence: 99%
“…In this service, users receive mobile coupons based on their location information from nearby stores [6] . in [7] Recently, Mohsen ahmadi a homomorphic distributed verification scheme using Pseudorandom Data to verify the storage correctness of user data in the cloud [8]. This scheme achieves the guarantee of data availability, reliability, and integrity.…”
Section: Introductionmentioning
confidence: 99%