Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Speeding up SMT Solving via Compiler Optimization

B Mikek, Q Zhang - Proceedings of the 31st ACM Joint European …, 2023 - dl.acm.org
SMT solvers are fundamental tools for reasoning about constraints in practical problems like
symbolic execution and program synthesis. Faster SMT solving can improve the …

Towards provably performant congestion control

A Agarwal, V Arun, D Ray, R Martins… - 21st USENIX Symposium …, 2024 - usenix.org
We seek to ease the design of congestion control algorithms (CCAs) that provably perform
well under diverse network scenarios including, cellular links, policers, token bucket filters …

Reverse engineering of obfuscated lua bytecode via interpreter semantics testing

C Luo, J Ming, J Fu, G Peng, Z Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As an efficient and multi-platform scripting language, Lua is gaining increasing popularity in
the industry. Unfortunately, Lua's unique advantages also catch cybercriminals' attention. A …

Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting

J Lee, W Lee - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …

Efficient deobfuscation of linear mixed boolean-arithmetic expressions

B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …

Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation

C Wang, W Wang, P Yao, Q Shi, J Zhou… - ACM Transactions on …, 2023 - dl.acm.org
Containers are ubiquitous data structures that support a variety of manipulations on the
elements, inducing the indirect value flows in the program. Tracking value flows through …

Simplification of general mixed boolean-arithmetic expressions: Gamba

B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

SMT Theory Arbitrage: Approximating Unbounded Constraints using Bounded Theories

B Mikek, Q Zhang - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
SMT solvers are foundational tools for reasoning about constraints in practical problems
both within and outside program analysis. Faster SMT solving improves the performance of …