Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
A taxonomy of software integrity protection techniques
M Ahmadvand, A Pretschner, F Kelbert - Advances in Computers, 2019 - Elsevier
Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to
security circumvention, privacy violation, reputation damage, and revenue loss. In this …
security circumvention, privacy violation, reputation damage, and revenue loss. In this …
A meta-model for software protections and reverse engineering attacks
Software protection techniques are used to protect valuable software assets against man-at-
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
the-end attacks. Those attacks include reverse engineering to steal confidential assets, and …
Divilar: Diversifying intermediate language for anti-repackaging on android platform
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous
solutions have mostly focused on the postmortem detection of repackaged apps by …
solutions have mostly focused on the postmortem detection of repackaged apps by …
Obfuscated integration of software protections
To counter man-at-the-end attacks such as reverse engineering and tampering, software is
often protected with techniques that require support modules to be linked into the …
often protected with techniques that require support modules to be linked into the …
Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning
R Tofighi-Shirazi, IM Asăvoae… - Proceedings of the 9th …, 2019 - dl.acm.org
The ability to efficiently detect the software protections used is at a prime to facilitate the
selection and application of adequate deobfuscation techniques. We present a novel …
selection and application of adequate deobfuscation techniques. We present a novel …
Replacement attacks against vm-protected applications
Process-level virtualization is increasingly being used to enhance the security of software
applications from reverse engineering and unauthorized modification (called software …
applications from reverse engineering and unauthorized modification (called software …
Parema: an unpacking framework for demystifying VM-based Android packers
Android packers have been widely adopted by developers to protect apps from being
plagiarized. Meanwhile, various unpacking tools unpack the apps through direct memory …
plagiarized. Meanwhile, various unpacking tools unpack the apps through direct memory …