Hiding a fault enabled virus through code construction

[1]  Jean-Louis Lanet,et al.  Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM , 2019, International Journal of Information Security.

[2]  D. Bhattacharyya,et al.  Defeating SQL injection attack in authentication security: an experimental study , 2019, International Journal of Information Security.

[3]  Jari-Matti Mäkelä,et al.  Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..

[4]  Jaswinder Singh,et al.  Challenge of Malware Analysis: Malware obfuscation Techniques , 2018 .

[5]  Jean-Louis Lanet,et al.  Let's shock our IoT's heart: ARMv7-M under (fault) attacks , 2018, ARES.

[6]  Bilgiday Yuce,et al.  Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation , 2018, Journal of Hardware and Systems Security.

[7]  Michael R. Lyu,et al.  On Secure and Usable Program Obfuscation: A Survey , 2017, ArXiv.

[8]  Jean-Louis Lanet,et al.  Persistent fault injection attack from white-box to black-box , 2017, 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B).

[9]  Ninon Eyrolles,et al.  Obfuscation with Mixed Boolean-Arithmetic Expressions : reconstruction, analysis and simplification tools. (Obfuscation par expressions mixtes arithmético-booléennes : reconstruction, analyse et outils de simplification) , 2017 .

[10]  John F. Walker,et al.  Characterising a CPU fault attack model via run-time data analysis , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[11]  Yu-ichi Hayashi,et al.  Buffer overflow attack with multiple fault injection and a proven countermeasure , 2017, Journal of Cryptographic Engineering.

[12]  Vijay Laxmi,et al.  Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions , 2016, ArXiv.

[13]  Marc F. Witteman,et al.  Controlling PC on ARM Using Fault Injection , 2016, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[14]  Divya Bansal,et al.  Detecting and Classifying Morphed Malwares: A Survey , 2015 .

[15]  Pascal Junod,et al.  Obfuscator-LLVM -- Software Protection for the Masses , 2015, 2015 IEEE/ACM 1st International Workshop on Software Protection.

[16]  Jean-Luc Danger,et al.  High precision fault injections on the instruction cache of ARMv7-M architectures , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[17]  Jean-Louis Lanet,et al.  The ultimate control flow transfer in a Java based smart card , 2015, Comput. Secur..

[18]  Shivam Bhasin,et al.  Fault attacks, injection techniques and tools for simulation , 2015, 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).

[19]  Muttukrishnan Rajarajan,et al.  Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.

[20]  Thomas Korak,et al.  On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms , 2014, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[21]  Sanjay Kumar Sahay,et al.  Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey , 2014, ArXiv.

[22]  Divya Bansal,et al.  Malware Analysis and Classification: A Survey , 2014 .

[23]  Ingrid Verbauwhede,et al.  Hardware Designer's Guide to Fault Attacks , 2013, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[24]  Michael Hutter,et al.  The Temperature Side Channel and Heating Fault Attacks , 2013, CARDIS.

[25]  Jean-Louis Lanet,et al.  Virus in a smart card: Myth or reality? , 2013, J. Inf. Secur. Appl..

[26]  Karine Heydemann,et al.  Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[27]  Julien Lancia,et al.  Java Card Combined Attacks with Localization-Agnostic Fault Injection , 2012, CARDIS.

[28]  Suhaimi Ibrahim,et al.  Camouflage in Malware: from Encryption to Metamorphism , 2012 .

[29]  Jean-Louis Lanet,et al.  Evaluation of the Ability to Transform SIM Applications into Hostile Applications , 2011, CARDIS.

[30]  Guillaume Barbu,et al.  Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures , 2011, CARDIS.

[31]  Jean-Louis Lanet,et al.  Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.

[32]  Mark Stamp,et al.  Hunting for undetectable metamorphic viruses , 2011, Journal in Computer Virology.

[33]  Kangbin Yim,et al.  Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[34]  Arnaud Gotlieb,et al.  Constraint-Based Test Input Generation for Java Bytecode , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.

[35]  Francesca Rossi,et al.  New trends in constraint satisfaction, planning, and scheduling: a survey , 2010, The Knowledge Engineering Review.

[36]  Eric Vétillard,et al.  Combined Attacks and Countermeasures , 2010, CARDIS.

[37]  Guillaume Barbu,et al.  Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.

[38]  Alessandro Barenghi,et al.  Low Voltage Fault Attacks on the RSA Cryptosystem , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[39]  Sylvain Guilley,et al.  Silicon-level Solutions to Counteract Passive and Active Attacks , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.

[40]  Jack W. Davidson,et al.  Defense against the dark arts , 2008, SIGCSE '08.

[41]  Ludovic Mé,et al.  Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.

[42]  David Naccache,et al.  The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.

[43]  David H. Ackley,et al.  Randomized instruction set emulation , 2005, TSEC.

[44]  David A. Wagner,et al.  Cryptanalysis of a provably secure CRT-RSA algorithm , 2004, CCS '04.

[45]  Jean-Pierre Seifert,et al.  A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.

[46]  Angelos D. Keromytis,et al.  Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.

[47]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[48]  Qiang Shen,et al.  Solution Techniques for Constraint Satisfaction Problems: Foundations , 2001, Artificial Intelligence Review.

[49]  Chris N. Potts,et al.  Constraint satisfaction problems: Algorithms and applications , 1999, Eur. J. Oper. Res..

[50]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[51]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[52]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[53]  Edward P. K. Tsang,et al.  Foundations of constraint satisfaction , 1993, Computation in cognitive science.

[54]  A. H. Johnston,et al.  Laser simulation of single-particle effects , 1992 .

[55]  Vipin Kumar,et al.  Algorithms for Constraint-Satisfaction Problems: A Survey , 1992, AI Mag..

[56]  Premachandran R. Menon,et al.  Deductive Fault Simulation with Functional Blocks , 1978, IEEE Transactions on Computers.

[57]  Ernst G. Ulrich,et al.  Fault-test analysis techniques based on logic simulation , 1972, DAC '72.

[58]  Douglas B. Armstrong,et al.  A Deductive Method for Simulating Faults in Logic Circuits , 1972, IEEE Transactions on Computers.

[59]  R. J. Suhocki,et al.  Design and Use of Fault Simulation for Saturn Computer Design , 1967, IEEE Trans. Electron. Comput..

[60]  D. Habing The Use of Lasers to Simulate Radiation-Induced Transients in Semiconductor Devices and Circuits , 1965 .

[61]  Stefan Winter,et al.  On the utility of higher order fault models for fault injections , 2015 .

[62]  Arenberg Doctoral,et al.  Code Obfuscation Techniques for Software Protection , 2012 .

[63]  Jean-Louis Lanet,et al.  Evaluation of Countermeasures Against Fault Attacks on Smart Cards , 2011 .

[64]  Stephen Drape,et al.  Intellectual Property Protection using Obfuscation , 2010 .

[65]  Lixi Chen Code Obfuscation Techniques for Software Protection , 2010 .

[66]  Michael Hutter,et al.  Optical and EM Fault-Attacks on CRT-based RSA : Concrete Results , 2007 .

[67]  Jacques Julliand,et al.  Approches formelles dans l'assistance au développement de logiciels , 2006 .

[68]  Koen De Bosschere,et al.  On the Effectiveness of Source Code Transformations for Binary Obfuscation , 2006, Software Engineering Research and Practice.

[69]  Arini Balakrishnan,et al.  Code Obfuscation Literature Survey , 2005 .

[70]  Christophe Giraud,et al.  A Survey on Fault Attacks , 2004, CARDIS.

[71]  Roman Barták,et al.  Constraint Programming: In Pursuit of the Holy Grail , 1999 .

[72]  Douglas Low,et al.  Java Control Flow Obfuscation , 1998 .

[73]  Peter Jeavons,et al.  A Survey of Tractable Constraint Satisfaction Problems , 1997 .