Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
You shall not repackage! demystifying anti-repackaging on android
App repackaging refers to the practice of customizing an existing mobile app and
redistributing it in the wild. In this way, the attacker aims to force some mobile users to install …
redistributing it in the wild. In this way, the attacker aims to force some mobile users to install …
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps
Android apps are subject to malicious reverse engineering and code tampering for many
reasons, like premium features unlocking and malware piggybacking. Scientific literature …
reasons, like premium features unlocking and malware piggybacking. Scientific literature …
[HTML][HTML] Design, implementation, and automation of a risk management approach for man-at-the-end software protection
The last years have seen an increase in Man-at-the-End (MATE) attacks against software
applications, both in number and severity. However, software protection, which aims at …
applications, both in number and severity. However, software protection, which aims at …
A meta-model for software protections and reverse engineering attacks
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
Obfuscated integration of software protections
To counter man-at-the-end attacks such as reverse engineering and tampering, software is
often protected with techniques that require support modules to be linked into the …
often protected with techniques that require support modules to be linked into the …
NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS
This special session paper introduces the Horizon Europe NEUROPULS project, which
targets the development of secure and energy-efficient RISC-V interfaced neuromorphic …
targets the development of secure and energy-efficient RISC-V interfaced neuromorphic …
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
Context Code hardening is meant to fight malicious tampering with sensitive code executed
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
Protecting the confidentiality of applications on commodity operating systems, both on
desktop and mobile devices, is challenging: attackers have unrestricted control over an …
desktop and mobile devices, is challenging: attackers have unrestricted control over an …
Armand: Anti-repackaging through multi-pattern anti-tampering based on native detection
App repackaging refers to the practice of customizing an existing mobile app and
redistributing it in the wild to fool the final user into installing the repackaged app instead of …
redistributing it in the wild to fool the final user into installing the repackaged app instead of …
Code renewability for native software protection
Software protection aims at safeguarding assets embedded in software by preventing and
delaying reverse engineering and tampering attacks. This article presents an architecture …
delaying reverse engineering and tampering attacks. This article presents an architecture …