Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024‏ - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022‏ - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

MDGraph: A novel malware detection method based on memory dump and graph neural network

Q Li, B Zhang, D Tian, X Jia, C Hu - Expert Systems with Applications, 2024‏ - Elsevier
Malware detection is of great importance to computer security. Although the malware
detection approaches have made great progress in recent years, these methods are still …

A novel malware detection method based on API embedding and API parameters

B Zhou, H Huang, J **a, D Tian - The Journal of Supercomputing, 2024‏ - Springer
Malware is becoming increasingly prevalent in recent years with the widespread
deployment of the information system. Many malicious programs pose a great threat to …

Technical Report: Hardening Code Obfuscation Against Automated Attacks

M Schloegel, T Blazytko, M Contag… - arxiv preprint arxiv …, 2021‏ - arxiv.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

Rope: Covert multi-process malware execution with return-oriented programming

DC D'Elia, L Invidia, L Querzoni - European Symposium on Research in …, 2021‏ - Springer
Distributed execution designs challenge behavioral analyses of anti-malware solutions by
spreading seemingly benign chunks of a malicious payload to multiple processes …

Dynamic taint analysis versus obfuscated self-checking

S Banescu, S Valenzuela, M Guggenmos… - Proceedings of the 37th …, 2021‏ - dl.acm.org
Software protection in practice addresses the yearly loss of tens of billion USD for software
manufacturers, a result of malicious end-users tampering with the software (” software …

[PDF][PDF] Rope: Bypassing behavioral detection of malware with distributed ROP-driven execution

DC D'Elia, L Invidia - Black Hat USA, 2021‏ - i.blackhat.com
Rope is a new covert design for distributed malware execution. Rope malware samples are
payloads expressed in return-oriented programming and divided into chunks that pre …

Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud

J Wang, J Pang, J Wei - … of Pioneering Computer Scientists, Engineers and …, 2021‏ - Springer
Users usually focus on the application-level requirements which are quite friendly and direct
to them. However, there are no existing tools automating the application-level requirements …

[PDF][PDF] Evaluation Methodologies in Software Protection Research—Supplemental Material

B DE SUTTER, S SCHRITTWIESER, B COPPENS‏ - users.elis.ugent.be
1 Overview This supplemental material categorizes all papers according to their perspective
(Section 2), lists our definitions of software protection methods (Section 3), analysis methods …