Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

{RE-Mind}: a first look inside the mind of a reverse engineer

A Mantovani, S Aonzo, Y Fratantonio… - 31st USENIX Security …, 2022 - usenix.org
When a human activity requires a lot of expertise and very specialized cognitive skills that
are poorly understood by the general population, it is often consideredan art.'Different …

Partial (in) completeness in abstract interpretation: limiting the imprecision in program analysis

M Campion, M Dalla Preda, R Giacobazzi - Proceedings of the ACM on …, 2022 - dl.acm.org
Imprecision is inherent in any decidable (sound) approximation of undecidable program
properties. In abstract interpretation this corresponds to the release of false alarms, eg, when …

Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners

A Happe, J Cito - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Offensive security-tests are commonly employed to pro-actively discover potential
vulnerabilities. They are performed by specialists, also known as penetration-testers or white …

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

M Ollivier, S Bardin, R Bonichon… - Proceedings of the 35th …, 2019 - dl.acm.org
Code obfuscation is a major tool for protecting software intellectual property from attacks
such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …

A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps

S Berlato, M Ceccato - Journal of Information Security and Applications, 2020 - Elsevier
Android apps are subject to malicious reverse engineering and code tampering for many
reasons, like premium features unlocking and malware piggybacking. Scientific literature …

A meta-model for software protections and reverse engineering attacks

C Basile, D Canavese, L Regano, P Falcarin… - Journal of Systems and …, 2019 - Elsevier
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …

A qualitative evaluation of reverse engineering tool usability

J Mattei, M McLaughlin, S Katcher… - Proceedings of the 38th …, 2022 - dl.acm.org
Software reverse engineering is a challenging and time consuming task. With the growing
demand for reverse engineering in vulnerability discovery and malware analysis, manual …

[HTML][HTML] Design, implementation, and automation of a risk management approach for man-at-the-End software protection

C Basile, B De Sutter, D Canavese, L Regano… - Computers & …, 2023 - Elsevier
The last years have seen an increase in Man-at-the-End (MATE) attacks against software
applications, both in number and severity. However, software protection, which aims at …

A formal framework to measure the incompleteness of abstract interpretations

M Campion, C Urban, M Dalla Preda… - International Static …, 2023 - Springer
In program analysis by abstract interpretation, backward-completeness represents no loss of
precision between the result of the analysis and the abstraction of the concrete execution …