[SW Security] OBFSCURO: A Commodity Obfuscation Engine on Intel SGX, Network and Distributed System Security Symposium (NDSS), Feb. 2019

OBFSCURO: A Commodity Obfuscation Engine on Intel SGX, Network and Distributed System Security Symposium (NDSS), Feb. 2019


Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee


본 논문은 Trusted Computing 환경인 SGX 위에서 이론적으로 안전한 프로그램 obfuscation 기술을 제안한다. 프로그램의 데이터플로우, 컨트롤플로우가 모두 Oblivious RAM을 통하여 동작하므로, 최근 알려진 각종 사이드체널 공격 (페이지폴트 기반, 캐쉬 기반, 브랜치 프리딕터 기반 등)에도 안전하다.

0
0

International Papers

SW Security Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM, Network and Distributed System Security Symposium (NDSS), Feb 2017 (Acceptance rate: 16%)
Mobile Cloud Computing An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, The 4th International Conference on Network, Communication and Computing (ICNCC), published in International Journal of Engineering and Technology (IJET), Feb 2017
Mobile Cloud Computing An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, International Journal of Engineering and Technology 9 (1), Feb 2017
HW Security Efficient Security Monitoring with Core Debug Interface in an Embedded Processor, ACM Transactions on Design Automation of Electronic Systems (TODAES), Dec 2016
SW Security Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques, ACM Computing Surveys (CSUR), Nov 2016
AI Security LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems, arXiv preprint arXiv:1611.01726, Nov 2016
SW Security A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It’s Applications, International Conference on Computer Science and its Applications, 694-698, Nov 2016
HW Security A Hardware-based Technique for Efficient Implicit Information Flow Tracking, International Conference on Computer Aided Design (ICCAD), Nov. 2016 (Acceptance rate: 23%)
Mobile Cloud Computing Optimization Techniques to Enable Execution Offloading for 3D Video Games, Multimedia Tools and Applications(MTAP), Jul 2016
Application Specific Architectures Development of Custom Digital Signal Processor for Finger Recognition Vision Application, International Conference on Ubiquitous Computing Application and Wireless Sensor Network, Jul 2016
SW Security Instant OS Updates via Userspace Checkpoint-and-Restart, USENIX Annual Technical Conference (ATC), June 2016
SW Security Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%)
HW Security Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), Jun 2016
HW Security A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, Jun 2016
HW Security HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%)
SW Security TrackMeOrNot: Enabling Flexible Control on Web Tracking, International Conference on World Wide Web (WWW), April 2016
HW Security Integration of ROP/JOP Monitoring IPs in an ARM-based SoC Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2016 (Acceptance rate: 24%)
Mobile Cloud Computing Energy-Reduction Offloading Technique for Streaming Media Servers, Mobile Information Systems, Mar 2016
SW Security Enforcing Kernel Security Invariants with Data Flow Integrity, Network and Distributed System Security Symposium (NDSS), Feb 2016
Application Specific Architectures Software-based Selective Validation Techniques for Robust CGRAs against Soft Errors, Transactions on Embedded Computing Systems, VOL.15, NO.20, Feb 2016