R.I.P.
๐ป
Ghosted
An Approach for Safe and Secure Software Protection Supported by Symbolic Execution
March 11, 2026 ยท Grace Period ยท ๐ Database and Expert Systems Applications - DEXA 2023 Workshops. Communications in Computer and Information Science (CCIS), vol 1872, pp. 67-78. Springer, Cham, 2023
Authors
Daniel Dorfmeister, Flavio Ferrarotti, Bernhard Fischer, Evelyn Haslinger, Rudolf Ramler, Markus Zimmermann
arXiv ID
2603.10608
Category
cs.CR: Cryptography & Security
Citations
0
Venue
Database and Expert Systems Applications - DEXA 2023 Workshops. Communications in Computer and Information Science (CCIS), vol 1872, pp. 67-78. Springer, Cham, 2023
Abstract
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
๐ Similar Papers
In the same crypt โ Cryptography & Security
R.I.P.
๐ป
Ghosted
Membership Inference Attacks against Machine Learning Models
R.I.P.
๐ป
Ghosted
The Limitations of Deep Learning in Adversarial Settings
R.I.P.
๐ป
Ghosted
Practical Black-Box Attacks against Machine Learning
R.I.P.
๐ป
Ghosted
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
R.I.P.
๐ป
Ghosted