You shall not repackage! demystifying anti-repackaging on android

A Merlo, A Ruggia, L Sciolla, L Verderame - Computers & Security, 2021 - Elsevier
App repackaging refers to the practice of customizing an existing mobile app and
redistributing it in the wild. In this way, the attacker aims to force some mobile users to install …

A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps

S Berlato, M Ceccato - Journal of Information Security and Applications, 2020 - Elsevier
Android apps are subject to malicious reverse engineering and code tampering for many
reasons, like premium features unlocking and malware piggybacking. Scientific literature …

[HTML][HTML] Design, implementation, and automation of a risk management approach for man-at-the-end software protection

C Basile, B De Sutter, D Canavese, L Regano… - Computers & …, 2023 - Elsevier
The last years have seen an increase in Man-at-the-End (MATE) attacks against software
applications, both in number and severity. However, software protection, which aims at …

A meta-model for software protections and reverse engineering attacks

C Basile, D Canavese, L Regano, P Falcarin… - Journal of Systems and …, 2019 - Elsevier
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …

Obfuscated integration of software protections

J Van den Broeck, B Coppens, B De Sutter - International Journal of …, 2021 - Springer
To counter man-at-the-end attacks such as reverse engineering and tampering, software is
often protected with techniques that require support modules to be linked into the …

NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS

F Pavanello, C Marchand, I O'Connor… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
This special session paper introduces the Horizon Europe NEUROPULS project, which
targets the development of secure and energy-efficient RISC-V interfaced neuromorphic …

Empirical assessment of the effort needed to attack programs protected with client/server code splitting

A Viticchié, L Regano, C Basile, M Torchiano… - Empirical Software …, 2020 - Springer
Context Code hardening is meant to fight malicious tampering with sensitive code executed
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone

D Quarta, M Ianni, A Machiry, Y Fratantonio… - … in the Context of Man At …, 2021 - dl.acm.org
Protecting the confidentiality of applications on commodity operating systems, both on
desktop and mobile devices, is challenging: attackers have unrestricted control over an …

Armand: Anti-repackaging through multi-pattern anti-tampering based on native detection

A Merlo, A Ruggia, L Sciolla, L Verderame - Pervasive and Mobile …, 2021 - Elsevier
App repackaging refers to the practice of customizing an existing mobile app and
redistributing it in the wild to fool the final user into installing the repackaged app instead of …

Code renewability for native software protection

B Abrath, B Coppens, JVD Broeck, B Wyseur… - ACM Transactions on …, 2020 - dl.acm.org
Software protection aims at safeguarding assets embedded in software by preventing and
delaying reverse engineering and tampering attacks. This article presents an architecture …