Hiding a fault enabled virus through code construction
暂无分享,去创建一个
[1] Jean-Louis Lanet,et al. Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM , 2019, International Journal of Information Security.
[2] D. Bhattacharyya,et al. Defeating SQL injection attack in authentication security: an experimental study , 2019, International Journal of Information Security.
[3] Jari-Matti Mäkelä,et al. Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..
[4] Jaswinder Singh,et al. Challenge of Malware Analysis: Malware obfuscation Techniques , 2018 .
[5] Jean-Louis Lanet,et al. Let's shock our IoT's heart: ARMv7-M under (fault) attacks , 2018, ARES.
[6] Bilgiday Yuce,et al. Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation , 2018, Journal of Hardware and Systems Security.
[7] Michael R. Lyu,et al. On Secure and Usable Program Obfuscation: A Survey , 2017, ArXiv.
[8] Jean-Louis Lanet,et al. Persistent fault injection attack from white-box to black-box , 2017, 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B).
[9] Ninon Eyrolles,et al. Obfuscation with Mixed Boolean-Arithmetic Expressions : reconstruction, analysis and simplification tools. (Obfuscation par expressions mixtes arithmético-booléennes : reconstruction, analyse et outils de simplification) , 2017 .
[10] John F. Walker,et al. Characterising a CPU fault attack model via run-time data analysis , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[11] Yu-ichi Hayashi,et al. Buffer overflow attack with multiple fault injection and a proven countermeasure , 2017, Journal of Cryptographic Engineering.
[12] Vijay Laxmi,et al. Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions , 2016, ArXiv.
[13] Marc F. Witteman,et al. Controlling PC on ARM Using Fault Injection , 2016, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[14] Divya Bansal,et al. Detecting and Classifying Morphed Malwares: A Survey , 2015 .
[15] Pascal Junod,et al. Obfuscator-LLVM -- Software Protection for the Masses , 2015, 2015 IEEE/ACM 1st International Workshop on Software Protection.
[16] Jean-Luc Danger,et al. High precision fault injections on the instruction cache of ARMv7-M architectures , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[17] Jean-Louis Lanet,et al. The ultimate control flow transfer in a Java based smart card , 2015, Comput. Secur..
[18] Shivam Bhasin,et al. Fault attacks, injection techniques and tools for simulation , 2015, 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[19] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[20] Thomas Korak,et al. On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms , 2014, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[21] Sanjay Kumar Sahay,et al. Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey , 2014, ArXiv.
[22] Divya Bansal,et al. Malware Analysis and Classification: A Survey , 2014 .
[23] Ingrid Verbauwhede,et al. Hardware Designer's Guide to Fault Attacks , 2013, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[24] Michael Hutter,et al. The Temperature Side Channel and Heating Fault Attacks , 2013, CARDIS.
[25] Jean-Louis Lanet,et al. Virus in a smart card: Myth or reality? , 2013, J. Inf. Secur. Appl..
[26] Karine Heydemann,et al. Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[27] Julien Lancia,et al. Java Card Combined Attacks with Localization-Agnostic Fault Injection , 2012, CARDIS.
[28] Suhaimi Ibrahim,et al. Camouflage in Malware: from Encryption to Metamorphism , 2012 .
[29] Jean-Louis Lanet,et al. Evaluation of the Ability to Transform SIM Applications into Hostile Applications , 2011, CARDIS.
[30] Guillaume Barbu,et al. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures , 2011, CARDIS.
[31] Jean-Louis Lanet,et al. Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.
[32] Mark Stamp,et al. Hunting for undetectable metamorphic viruses , 2011, Journal in Computer Virology.
[33] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[34] Arnaud Gotlieb,et al. Constraint-Based Test Input Generation for Java Bytecode , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[35] Francesca Rossi,et al. New trends in constraint satisfaction, planning, and scheduling: a survey , 2010, The Knowledge Engineering Review.
[36] Eric Vétillard,et al. Combined Attacks and Countermeasures , 2010, CARDIS.
[37] Guillaume Barbu,et al. Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.
[38] Alessandro Barenghi,et al. Low Voltage Fault Attacks on the RSA Cryptosystem , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[39] Sylvain Guilley,et al. Silicon-level Solutions to Counteract Passive and Active Attacks , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[40] Jack W. Davidson,et al. Defense against the dark arts , 2008, SIGCSE '08.
[41] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[42] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[43] David H. Ackley,et al. Randomized instruction set emulation , 2005, TSEC.
[44] David A. Wagner,et al. Cryptanalysis of a provably secure CRT-RSA algorithm , 2004, CCS '04.
[45] Jean-Pierre Seifert,et al. A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.
[46] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[47] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[48] Qiang Shen,et al. Solution Techniques for Constraint Satisfaction Problems: Foundations , 2001, Artificial Intelligence Review.
[49] Chris N. Potts,et al. Constraint satisfaction problems: Algorithms and applications , 1999, Eur. J. Oper. Res..
[50] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[51] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[52] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[53] Edward P. K. Tsang,et al. Foundations of constraint satisfaction , 1993, Computation in cognitive science.
[54] A. H. Johnston,et al. Laser simulation of single-particle effects , 1992 .
[55] Vipin Kumar,et al. Algorithms for Constraint-Satisfaction Problems: A Survey , 1992, AI Mag..
[56] Premachandran R. Menon,et al. Deductive Fault Simulation with Functional Blocks , 1978, IEEE Transactions on Computers.
[57] Ernst G. Ulrich,et al. Fault-test analysis techniques based on logic simulation , 1972, DAC '72.
[58] Douglas B. Armstrong,et al. A Deductive Method for Simulating Faults in Logic Circuits , 1972, IEEE Transactions on Computers.
[59] R. J. Suhocki,et al. Design and Use of Fault Simulation for Saturn Computer Design , 1967, IEEE Trans. Electron. Comput..
[60] D. Habing. The Use of Lasers to Simulate Radiation-Induced Transients in Semiconductor Devices and Circuits , 1965 .
[61] Stefan Winter,et al. On the utility of higher order fault models for fault injections , 2015 .
[62] Arenberg Doctoral,et al. Code Obfuscation Techniques for Software Protection , 2012 .
[63] Jean-Louis Lanet,et al. Evaluation of Countermeasures Against Fault Attacks on Smart Cards , 2011 .
[64] Stephen Drape,et al. Intellectual Property Protection using Obfuscation , 2010 .
[65] Lixi Chen. Code Obfuscation Techniques for Software Protection , 2010 .
[66] Michael Hutter,et al. Optical and EM Fault-Attacks on CRT-based RSA : Concrete Results , 2007 .
[67] Jacques Julliand,et al. Approches formelles dans l'assistance au développement de logiciels , 2006 .
[68] Koen De Bosschere,et al. On the Effectiveness of Source Code Transformations for Binary Obfuscation , 2006, Software Engineering Research and Practice.
[69] Arini Balakrishnan,et al. Code Obfuscation Literature Survey , 2005 .
[70] Christophe Giraud,et al. A Survey on Fault Attacks , 2004, CARDIS.
[71] Roman Barták,et al. Constraint Programming: In Pursuit of the Holy Grail , 1999 .
[72] Douglas Low,et al. Java Control Flow Obfuscation , 1998 .
[73] Peter Jeavons,et al. A Survey of Tractable Constraint Satisfaction Problems , 1997 .