Using instruction code obfuscation to defeat malware attacks

Thumbnail Image

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

Montana State University - Bozeman, College of Engineering

Abstract

This thesis investigates the use of obfuscated instruction codes within a redundant, RISC-V computer architecture to detect and defeat malware injected cyberattacks. The system abstracts the obfuscation from the user so that the system looks like a single processor edge computer. The system was tested using real-time sensor data coming from a camera while image processing algorithms were performed. The results of this thesis contribute to the body of knowledge on how to keep edge computers used in critical applications operational during a cyber attack.

Description

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright (c) 2002-2022, LYRASIS. All rights reserved.