Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022 - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting

J Lee, W Lee - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …

Efficient deobfuscation of linear mixed boolean-arithmetic expressions

B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …

Technical Report: Hardening Code Obfuscation Against Automated Attacks

M Schloegel, T Blazytko, M Contag… - arXiv preprint arXiv …, 2021 - arxiv.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts

MY Wong, M Landen, F Li, F Monrose… - Twentieth Symposium on …, 2024 - usenix.org
Malware analysis is the process of identifying whether certain software is malicious and
determining its capabilities. Unfortunately, malware authors have developed increasingly …

Simplification of general mixed boolean-arithmetic expressions: Gamba

B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …

Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation

N Zhang, D Xu, J Ming, J Xu, Q Yu - 2025 IEEE Symposium on …, 2024 - computer.org
Virtualization obfuscators are commonly employed to safeguard proprietary code or to
impede malware analysis. Despite significant efforts to combat these obfuscators over the …

COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module

Z Zhang, J Xue, T Baker, T Chen, Y Tan, Y Li - Computers & Security, 2024 - Elsevier
Virtualization obfuscation is a very effective method used to protect programs from malicious
analysis by obscuring their code. Due to the fixed scheduling structures, typical virtualization …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …