Search papers, labs, and topics across Lattice.
Software Competence Center Hagenberg, Hagenberg, Austria
4
6
4
3
A memory allocation scheme inspired by software diversity can effectively delay RowHammer attacks, buying precious time for proactive defense measures.
Guaranteeing safety properties of copy-protected industrial software, even when executed on unintended hardware, becomes possible with a novel PUF-based binding and symbolic execution verification.
Stop neural network model theft: bind your models to specific hardware using PUFs, rendering them useless on clones.
Protect your embedded system IP: this novel software-hardware binding makes unauthorized copies run suboptimally, requiring attackers to perform complex dynamic analysis on the genuine device to extract sensitive data.