Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Loki: Hardening code obfuscation against automated attacks
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …
digital rights within our society. Despite its huge practical importance, both commercial and …
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
Efficient deobfuscation of linear mixed boolean-arithmetic expressions
B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
Technical Report: Hardening Code Obfuscation Against Automated Attacks
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …
digital rights within our society. Despite its huge practical importance, both commercial and …
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts
Malware analysis is the process of identifying whether certain software is malicious and
determining its capabilities. Unfortunately, malware authors have developed increasingly …
determining its capabilities. Unfortunately, malware authors have developed increasingly …
Simplification of general mixed boolean-arithmetic expressions: Gamba
B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation
Virtualization obfuscators are commonly employed to safeguard proprietary code or to
impede malware analysis. Despite significant efforts to combat these obfuscators over the …
impede malware analysis. Despite significant efforts to combat these obfuscators over the …
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module
Virtualization obfuscation is a very effective method used to protect programs from malicious
analysis by obscuring their code. Due to the fixed scheduling structures, typical virtualization …
analysis by obscuring their code. Due to the fixed scheduling structures, typical virtualization …
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …