![]() ![]() The obfuscation of source code is a mechanism to modify a source code to make it unintelligible by humans even with the help of computing resources. One of the solutions for the code owner in order to protect his intellectual property is to obfuscate his algorithms. When running a private code on a Public Cloud or on any remote machine, its owner has no guarantees that the code cannot be reverse engineered, understood and modified. The development of the new Cloud Computing paradigm as lead to a reevaluation of the security issues. The hardware cost of a 1024-entry IRF on an FPGA was modest: two 18 kib block RAM elements and 0.8% increase of the logic elements. The time-oriented algorithm found a sub-optimal assignment of a 1024-entry IRF in 16 ms, whose precision was 0.5% inferior to the precision-oriented solution at a maximum. According to the evaluation results, the precision-oriented algorithm obtained the same as or very close to the optimal assignment of an IRF with 48 or less entries. This paper presents two heuristic algorithms, precision-oriented and time-oriented, to find sub-optimal assignments to the IRF. ![]() This means the instructions in the IRF should be carefully selected both to have more instructions be executed through the IRF and to flatten the distribution of the indices of the IRF. For this purpose, the correspondences between IRF entries and their original instructions must be concealed. The IRF is also an attractive and cost-effective unit to protect embedded software from analysis, plagiarism, and falsification. Instruction Register File (IRF) was originally proposed to reduce the power consumption of a microprocessor by providing the indirect access to frequently executed instructions. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |