Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Bending microarchitectural weird machines towards practicality
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …
nominal instruction set architectures and their actual (microarchitectural) implementations …
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code
Automatically generating function summaries for binaries is an extremely valuable but
challenging task, since it involves translating the execution behavior and semantics of the …
challenging task, since it involves translating the execution behavior and semantics of the …
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
equivalent but complex expression that is hard to understand. MBA obfuscation has been …
Efficient deobfuscation of linear mixed boolean-arithmetic expressions
B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …
Simplification of general mixed boolean-arithmetic expressions: Gamba
B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …
[PDF][PDF] Consensual Resilient Control: Stateless Recovery of Stateful Controllers
Safety-critical systems have to absorb accidental and malicious faults to obtain high mean-
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …
Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation
Virtualization obfuscators are commonly employed to safeguard proprietary code or to
impede malware analysis. Despite significant efforts to combat these obfuscators over the …
impede malware analysis. Despite significant efforts to combat these obfuscators over the …
WASMixer: binary obfuscation for WebAssembly
WebAssembly (Wasm) is an emerging binary format that draws great attention from the
community. However, Wasm binaries are weakly protected, as they can be read, edited, and …
community. However, Wasm binaries are weakly protected, as they can be read, edited, and …
Combating temporal composition inference by high-order camouflaged network topology obfuscation
X Li, X Yang, Y Huang, Y Chen - Computers & Security, 2024 - Elsevier
Topology inference driven by non-collaborative or incomplete prior knowledge is widely
used in pivotal target network sieving and completion. However, perceivable topology also …
used in pivotal target network sieving and completion. However, perceivable topology also …