Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8867
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBolat, Alperen-
dc.contributor.authorCelik, Seyyid Hikmet-
dc.contributor.authorOlgun, Ataberk-
dc.contributor.authorErgin, Oğuz-
dc.contributor.authorOttavi, Marco-
dc.date.accessioned2022-11-30T19:22:10Z-
dc.date.available2022-11-30T19:22:10Z-
dc.date.issued2022-
dc.identifier.isbn978-1-6654-1693-1-
dc.identifier.urihttps://doi.org/10.1109/DSN53405.2022.00053-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/8867-
dc.description52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) -- JUN 27-30, 2022 -- Baltimore, MDen_US
dc.description.abstractModern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. However, these executables are still vulnerable to reverse engineering techniques that can extract secret information from programs (e.g., an algorithm, cryptographic keys), violating the IP rights and potentially exposing the trade secrets of the software developer. Malicious parties can (i) statically analyze the disassembly of the executable (static analysis) or (ii) dynamically analyze the software by executing it on a controlled device and observe performance counter values or exploit side-channels to reverse engineer software (dynamic analysis). We develop ERIC, a new, efficient, and general software obfuscation framework. ERIC protects software against (i) static analysis, by making only an encrypted version of software executables available to the human eye, no matter how the software is distributed, and (ii) dynamic analysis, by guaranteeing that an encrypted executable can only be correctly decrypted and executed by a single authenticated device. ERIC comprises key hardware and software components to provide efficient software obfuscation support: (i) a hardware decryption engine (HDE) enables efficient decryption of encrypted hardware in the target device, (ii) the compiler can seamlessly encrypt software executables given only a unique device identifier. Both the hardware and software components are ISA-independent, making ERIC general. The key idea of ERIC is to use physical unclonable functions (PUFs), unique device identifiers, as secret keys in encrypting software executables. Malicious parties that cannot access the PUF in the target device cannot perform static or dynamic analyses on the encrypted binary. We develop ERIC's prototype on an FPGA to evaluate it endto-end. Our prototype extends RISC-V Rocket Chip with the hardware decryption engine (HDE) to minimize the overheads of software decryption. We augment the custom LLVM-based compiler to enable partial/full encryption of RISC-V executables. The HDE incurs minor FPGA resource overheads, it requires 2.63% more LUTs and 3.83% more flip-flops compared to the Rocket Chip baseline. LLVM-based software encryption increases compile time by 15.22% and the executable size by 1.59%. ERIC is publicly available and can be downloaded from https://github.com/kasirgalabs/ERIC.en_US
dc.description.sponsorshipIEEE,IFIP,IEEE Comp Soc,Siemens,Johns Hopkins Univ,KAUST,Intel,Lancaster Univen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2022 52nd Annual Ieee/Ifip International Conference On Dependable Systems and Networks (Dsn 2022)en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectSoftware Obfuscationen_US
dc.subjectTrusted Executionen_US
dc.subjectHardware Authenticationen_US
dc.subjectPufen_US
dc.subjectInterneten_US
dc.subjectAegisen_US
dc.titleEric: an Efficient and Practical Software Obfuscation Frameworken_US
dc.typeConference Objecten_US
dc.identifier.startpage466en_US
dc.identifier.endpage474en_US
dc.identifier.wosWOS:000853348200040en_US
dc.identifier.scopus2-s2.0-85136338486en_US
dc.institutionauthorErgin, Oğuz-
dc.identifier.doi10.1109/DSN53405.2022.00053-
dc.authorscopusid57216901758-
dc.authorscopusid57815948000-
dc.authorscopusid57222238840-
dc.authorscopusid6603141208-
dc.authorscopusid23482610400-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.ozel2022v3_Editen_US
item.openairetypeConference Object-
item.languageiso639-1en-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

WEB OF SCIENCETM
Citations

1
checked on Dec 21, 2024

Page view(s)

122
checked on Dec 16, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.