Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024‏ - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Efficient malware detection using model-checking

F Song, T Touili - International Symposium on Formal Methods, 2012‏ - Springer
Over the past decade, malware costs more than $10 billion every year and the cost is still
increasing. Classical signature-based and emulation-based methods are becoming …

Pushdown model checking for malware detection

F Song, T Touili - International Journal on Software Tools for Technology …, 2014‏ - Springer
The number of malware is growing extraordinarily fast. Therefore, it is important to have
efficient malware detectors. Malware writers try to obfuscate their code by different …

Monadic abstract interpreters

I Sergey, D Devriese, M Might, J Midtgaard… - Proceedings of the 34th …, 2013‏ - dl.acm.org
Recent developments in the systematic construction of abstract interpreters hinted at the
possibility of a broad unification of concepts in static analysis. We deliver that unification by …

Integer Parameter Synthesis for Timed Automata.

A Jovanovic, D Lime, OH Roux - TACAS, 2013‏ - Springer
We provide a subclass of parametric timed automata (PTA) that we can actually and
efficiently analyze, and we argue that it retains most of the practical usefulness of PTA. The …

LTL model-checking for malware detection

F Song, T Touili - Tools and Algorithms for the Construction and Analysis …, 2013‏ - Springer
Nowadays, malware has become a critical security threat. Traditional anti-viruses such as
signature-based techniques and code emulation become insufficient and easy to get …

RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction

D Korczynski - 2016 11th International Conference on Malicious …, 2016‏ - ieeexplore.ieee.org
Reverse engineering packed binaries remain a tedious challenge as code packing is
continuously being used by malware to hinder detection and analysis. The problem of …

[HTML][HTML] Unveiling metamorphism by abstract interpretation of code properties

M Dalla Preda, R Giacobazzi, S Debray - Theoretical Computer Science, 2015‏ - Elsevier
Metamorphic code includes self-modifying semantics-preserving transformations to exploit
code diversification. The impact of metamorphism is growing in security and code protection …

Widening for control-flow

B Hardekopf, B Wiedermann, B Churchill… - … , Model Checking, and …, 2014‏ - Springer
We present a parameterized widening operator that determines the control-flow sensitivity of
an analysis, ie, its flow-sensitivity, context-sensitivity, and path-sensitivity. By instantiating the …

The grand challenge in metamorphic analysis

M Dalla Preda - … Conference on Information Systems, Technology and …, 2012‏ - Springer
Malware detection is a crucial aspect of software security. Malware typically recur to a variety
of disguise and concealing techniques in order to avoid detection. Metamorphism is the …