Reactive attestation: Automatic detection and reaction to software tampering attacks

A Viticchié, C Basile, A Avancini, M Ceccato… - Proceedings of the …, 2016 - dl.acm.org
Anti-tampering is a form of software protection conceived to detect and avoid the execution
of tampered programs. Tamper detection assesses programs' integrity with load or execution …

Empirical assessment of the effort needed to attack programs protected with client/server code splitting

A Viticchié, L Regano, C Basile, M Torchiano… - Empirical Software …, 2020 - Springer
Context Code hardening is meant to fight malicious tampering with sensitive code executed
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …

Codebender: Remote software protection using orthogonal replacement

M Ceccato, P Tonella - IEEE software, 2010 - ieeexplore.ieee.org
CodeBender implements a novel client replacement strategy to counter the malicious host
problem and address the problem of guaranteeing client-code security. CodeBender is a …

Конфигурирование защищенных систем со встроенными и мобильными устройствами

ВА Десницкий, ИВ Котенко, АА Чечулин - Вопросы защиты …, 2012 - elibrary.ru
Предлагается модель процесса конфигурирования защищенных систем со
встроенными и мобильными устройствами, а также архитектура программного …

Mitigating debugger-based attacks to Java applications with self-debugging

D Pizzolotto, S Berlato, M Ceccato - ACM Transactions on Software …, 2024 - dl.acm.org
Java bytecode is a quite high-level language and, as such, it is fairly easy to analyze and
decompile with malicious intents, eg, to tamper with code and skip license checks. Code …

Remote software protection by orthogonal client replacement

M Ceccato, P Tonella, MD Preda… - Proceedings of the 2009 …, 2009 - dl.acm.org
In a typical client-server scenario, a trusted server provides valuable services to a client,
which runs remotely on an untrusted platform. Of the many security vulnerabilities that may …

[PDF][PDF] On the impossibility of effectively using likely-invariants for software attestation purposes.

A Viticchié, C Basile, F Valenza, A Lioy - J. Wirel. Mob. Networks …, 2018 - core.ac.uk
Invariants monitoring is a software attestation technique that aims at proving the integrity of a
running application by checking likely-invariants, which are statistically significant predicates …

Towards a unified software attack model to assess software protections

C Basile, M Ceccato - 2013 21st International Conference on …, 2013 - ieeexplore.ieee.org
Attackers can tamper with programs to break usage conditions. Different software protection
techniques have been proposed to limit the possibility of tampering. Some of them just limit …

[PDF][PDF] DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs.

E Zhu, F Liu, X Fang, X Li, Y Yang, A Liang - J. Softw., 2014 - jsoftware.us
Nowadays, applications are usually large-scale, this making tasks of comprehending and
debugging software rather complicated. As a dynamic reduction technique for simplifying …

Конфигурирование встроенных и мобильных устройств на основе решения оптимизационной задачи

ВА Десницкий - Информатика и автоматизация, 2011 - mathnet.ru
Исследование посвящено изучению вопросов проектирования и анализа
комбинированных механизмов защиты сложных коммуникационных систем со …