Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Speeding up SMT Solving via Compiler Optimization
SMT solvers are fundamental tools for reasoning about constraints in practical problems like
symbolic execution and program synthesis. Faster SMT solving can improve the …
symbolic execution and program synthesis. Faster SMT solving can improve the …
Towards provably performant congestion control
We seek to ease the design of congestion control algorithms (CCAs) that provably perform
well under diverse network scenarios including, cellular links, policers, token bucket filters …
well under diverse network scenarios including, cellular links, policers, token bucket filters …
Reverse engineering of obfuscated lua bytecode via interpreter semantics testing
C Luo, J Ming, J Fu, G Peng, Z Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As an efficient and multi-platform scripting language, Lua is gaining increasing popularity in
the industry. Unfortunately, Lua's unique advantages also catch cybercriminals' attention. A …
the industry. Unfortunately, Lua's unique advantages also catch cybercriminals' attention. A …
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
Efficient deobfuscation of linear mixed boolean-arithmetic expressions
B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation
Containers are ubiquitous data structures that support a variety of manipulations on the
elements, inducing the indirect value flows in the program. Tracking value flows through …
elements, inducing the indirect value flows in the program. Tracking value flows through …
Simplification of general mixed boolean-arithmetic expressions: Gamba
B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
SMT Theory Arbitrage: Approximating Unbounded Constraints using Bounded Theories
B Mikek, Q Zhang - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
SMT solvers are foundational tools for reasoning about constraints in practical problems
both within and outside program analysis. Faster SMT solving improves the performance of …
both within and outside program analysis. Faster SMT solving improves the performance of …