Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
{RE-Mind}: a first look inside the mind of a reverse engineer
When a human activity requires a lot of expertise and very specialized cognitive skills that
are poorly understood by the general population, it is often consideredan art.'Different …
are poorly understood by the general population, it is often consideredan art.'Different …
Partial (in) completeness in abstract interpretation: limiting the imprecision in program analysis
Imprecision is inherent in any decidable (sound) approximation of undecidable program
properties. In abstract interpretation this corresponds to the release of false alarms, eg, when …
properties. In abstract interpretation this corresponds to the release of false alarms, eg, when …
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners
Offensive security-tests are commonly employed to pro-actively discover potential
vulnerabilities. They are performed by specialists, also known as penetration-testers or white …
vulnerabilities. They are performed by specialists, also known as penetration-testers or white …
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)
M Ollivier, S Bardin, R Bonichon… - Proceedings of the 35th …, 2019 - dl.acm.org
Code obfuscation is a major tool for protecting software intellectual property from attacks
such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …
such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps
Android apps are subject to malicious reverse engineering and code tampering for many
reasons, like premium features unlocking and malware piggybacking. Scientific literature …
reasons, like premium features unlocking and malware piggybacking. Scientific literature …
A meta-model for software protections and reverse engineering attacks
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
A qualitative evaluation of reverse engineering tool usability
Software reverse engineering is a challenging and time consuming task. With the growing
demand for reverse engineering in vulnerability discovery and malware analysis, manual …
demand for reverse engineering in vulnerability discovery and malware analysis, manual …
[HTML][HTML] Design, implementation, and automation of a risk management approach for man-at-the-End software protection
The last years have seen an increase in Man-at-the-End (MATE) attacks against software
applications, both in number and severity. However, software protection, which aims at …
applications, both in number and severity. However, software protection, which aims at …
A formal framework to measure the incompleteness of abstract interpretations
In program analysis by abstract interpretation, backward-completeness represents no loss of
precision between the result of the analysis and the abstraction of the concrete execution …
precision between the result of the analysis and the abstraction of the concrete execution …