Application of Memristors in Hardware Security: A Current State‐of‐the‐Art Technology

S Lv, J Liu, Z Geng - Advanced Intelligent Systems, 2021 - Wiley Online Library
Memristors are widely used in hardware security applications. Research progress in
memristor‐based physical unclonable functions (PUFs), random number generators …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

ZM Saadi, AT Sadiq, OZ Akif, AK Farhan - Electronics, 2024 - mdpi.com
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …

A meta-model for software protections and reverse engineering attacks

C Basile, D Canavese, L Regano, P Falcarin… - Journal of Systems and …, 2019 - Elsevier
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …

[HTML][HTML] Design, implementation, and automation of a risk management approach for man-at-the-End software protection

C Basile, B De Sutter, D Canavese, L Regano… - Computers & …, 2023 - Elsevier
The last years have seen an increase in Man-at-the-End (MATE) attacks against software
applications, both in number and severity. However, software protection, which aims at …

Building a Cybersecurity Knowledge Graph with CyberGraph

P Falcarin, F Dainese - Proceedings of the 2024 ACM/IEEE 4th …, 2024 - dl.acm.org
Software engineers and security professionals rely on a variety of sources of information,
including known vulnerabilities, newly identified weaknesses, and threats, as well as attack …

Software protection decision support and evaluation methodologies (dagstuhl seminar 19331)

B De Sutter, C Collberg, M Dalla Preda, B Wyseur - 2019 - drops.dagstuhl.de
This report documents the program and the outcomes of Dagstuhl Seminar 19331``Software
Protection Decision Support and Evaluation Methodologies''. The seminar is situated in the …

Malware analysis: Reverse engineering tools using santuko linux

M Alrammal, M Naveed, S Sallam… - Materials Today …, 2022 - Elsevier
The mobile malware is scaling up in terms of numbers and in degree of sophistication. The
analysis of mobile malware is challenging for several reasons eg, mobile apps are context …

[PDF][PDF] Keamanan Komputer'

GS Mahendra, M Wali, H Idwan, IME Listartha… - Galiono …, 2022 - researchgate.net
Keuntungan dari sistem keamanan komputer adalah untuk melindungi sistem komputer
agar tidak diakses oleh orang yang tidak berhak mengakses sistem komputer tersebut …