Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

T Ye, L Wu, T Ma, X Zhang, Y Du, P Liu, S Ji… - arxiv preprint arxiv …, 2023 - arxiv.org
Automatically generating function summaries for binaries is an extremely valuable but
challenging task, since it involves translating the execution behavior and semantics of the …

Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting

J Lee, W Lee - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Mixed Boolean Arithmetic (MBA) obfuscation transforms a program expression into an
equivalent but complex expression that is hard to understand. MBA obfuscation has been …

Efficient deobfuscation of linear mixed boolean-arithmetic expressions

B Reichenwallner, P Meerwald-Stadler - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Mixed Boolean-Arithmetic (MBA) expressions are frequently used for obfuscation. As they
combine arithmetic as well as Boolean operations, neither arithmetic laws nor transformation …

Simplification of general mixed boolean-arithmetic expressions: Gamba

B Reichenwallner… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Malware code often resorts to various self-protection techniques to complicate analysis. One
such technique is applying Mixed-Boolean Arithmetic (MBA) expressions as a way to create …

[PDF][PDF] Consensual Resilient Control: Stateless Recovery of Stateful Controllers

A Matovic, R Graczyk, F Lucchetti… - … Euromicro Conference on …, 2023 - drops.dagstuhl.de
Safety-critical systems have to absorb accidental and malicious faults to obtain high mean-
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …

Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation

N Zhang, D Xu, J Ming, J Xu, Q Yu - 2025 IEEE Symposium on …, 2024 - computer.org
Virtualization obfuscators are commonly employed to safeguard proprietary code or to
impede malware analysis. Despite significant efforts to combat these obfuscators over the …

WASMixer: binary obfuscation for WebAssembly

S Cao, N He, Y Guo, H Wang - European Symposium on Research in …, 2024 - Springer
WebAssembly (Wasm) is an emerging binary format that draws great attention from the
community. However, Wasm binaries are weakly protected, as they can be read, edited, and …

Combating temporal composition inference by high-order camouflaged network topology obfuscation

X Li, X Yang, Y Huang, Y Chen - Computers & Security, 2024 - Elsevier
Topology inference driven by non-collaborative or incomplete prior knowledge is widely
used in pivotal target network sieving and completion. However, perceivable topology also …