Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

A taxonomy of software integrity protection techniques

M Ahmadvand, A Pretschner, F Kelbert - Advances in Computers, 2019 - Elsevier
Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to
security circumvention, privacy violation, reputation damage, and revenue loss. In this …

A meta-model for software protections and reverse engineering attacks

C Basile, D Canavese, L Regano, P Falcarin… - Journal of Systems and …, 2019 - Elsevier
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …

Divilar: Diversifying intermediate language for anti-repackaging on android platform

W Zhou, Z Wang, Y Zhou, X Jiang - … of the 4th ACM Conference on Data …, 2014 - dl.acm.org
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous
solutions have mostly focused on the postmortem detection of repackaged apps by …

Obfuscated integration of software protections

J Van den Broeck, B Coppens, B De Sutter - International Journal of …, 2021 - Springer
To counter man-at-the-end attacks such as reverse engineering and tampering, software is
often protected with techniques that require support modules to be linked into the …

Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning

R Tofighi-Shirazi, IM Asăvoae… - Proceedings of the 9th …, 2019 - dl.acm.org
The ability to efficiently detect the software protections used is at a prime to facilitate the
selection and application of adequate deobfuscation techniques. We present a novel …

Replacement attacks against vm-protected applications

S Ghosh, J Hiser, JW Davidson - Proceedings of the 8th ACM SIGPLAN …, 2012 - dl.acm.org
Process-level virtualization is increasingly being used to enhance the security of software
applications from reverse engineering and unauthorized modification (called software …

Parema: an unpacking framework for demystifying VM-based Android packers

L Xue, Y Yan, L Yan, M Jiang, X Luo, D Wu… - Proceedings of the 30th …, 2021 - dl.acm.org
Android packers have been widely adopted by developers to protect apps from being
plagiarized. Meanwhile, various unpacking tools unpack the apps through direct memory …