skip to main content
10.1145/3178291.3178296acmotherconferencesArticle/Chapter ViewAbstractPublication Pagescs2Conference Proceedingsconference-collections
abstract

All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems

Published:24 January 2018Publication History

ABSTRACT

No abstract available.

References

  1. Giovanni Agosta, Alessandro Barenghi, and Gerardo Pelosi. 2012. A Code Morphing Methodology to Automate Power Analysis Countermeasures. In DAC. 77--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, and Michele Scandale. 2015. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks. 34, 8 (2015), 1320--1333.Google ScholarGoogle Scholar
  3. Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, and Jean-Louis Lanet. 2016. Runtime Code Polymorphism as a Protection Against Side Channel Attacks. Springer, 136--152.Google ScholarGoogle Scholar
  4. Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.. In NDSS. 8--11.Google ScholarGoogle Scholar
  5. Andrei Homescu, Stefan Brunthaler, Per Larsen, and Michael Franz. 2013. Librando: Transparent Code Randomization for Just-in-Time Compilers. In CCS (CCS '13). ACM, 993--1004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Vol. 31. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin OFlynn. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE, 195--212.Google ScholarGoogle Scholar

Index Terms

  1. All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CS2 '18: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
          January 2018
          27 pages
          ISBN:9781450363747
          DOI:10.1145/3178291

          Copyright © 2018 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 January 2018

          Check for updates

          Qualifiers

          • abstract
          • Research
          • Refereed limited

          Acceptance Rates

          CS2 '18 Paper Acceptance Rate2of8submissions,25%Overall Acceptance Rate27of91submissions,30%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader