-
Automatic Generation of Opaque Constants Based on the K-clique Problem for Resilient Data Obfuscation
IEEE International Conference on Software Analysis Evolution, and Reengineering
Authors: Roberto Tiella, Mariano Ceccato
Tags:
Year: 2017
-
A reference architecture for software protection
IEEE/IFIP Conference on Software Architecture
Authors: Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
Tags:
Year: 2016
-
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams
International Symposium on Empirical Software Engineering and Measurements
Authors: Mariano Ceccato, Riccardo Scandariato
Tags:
Year: 2016
-
Search Based Clustering for Protecting Software with Diversified Updates
Symposium on Search-Based Software Engineering
Authors: Mariano Ceccato, Paolo Falcarin, Alessandro Cabutto, Yosief Weldezghi Frezghi, Cristian-Alexandru Staicu
Tags:
Year: 2016
-
Assessment of Source Code Obfuscation Techniques.
ssessment of Source Code Obfuscation Techniques. IEEE International Working Conference on Source Code Analysis and Manipulation SCAM
Authors: Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella
Tags: Evaluation, Obfuscation Techniques
Year: 2016
-
Attack simulation based software protection assessment method
International Conference On Cyber Security and Protection of Digital Services
Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville
Tags:
Year: 2016
-
Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart CopReactive attestation. Automatic detection and reaction to software tampering attacks
2016 ACM Workshop on Software PROtection
Authors: Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens
Tags:
Year: 2016
-
Bjorn De Sutter, Jerome D’Annoville. Attack Simulation based Software Protection Assessment Method with Petri NetI
International Journal on Cyber Situational Awareness
Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville.
Tags:
Year: 2016
-
Tightly-Coupled Self-Debugging Software Protection
International Workshop on Software Security, Protection and reverse Engineering
Authors: Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert
Tags:
Year: 2016
-
The ASPIRE Framework for Software Protection
2016 ACM Workshop on Software PROtection
Authors: Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome d'Annoville
Tags: Obfuscation Techniques
Year: 2016
-
SAD Droid: Zelf-Anti-Debugging voor Android
Authors: Joris Wijnant
Tags: Obfuscation Techniques
Year: 2015
-
Automatic discovery of software attacks via backward reasoning
Authors: Cataldo Basile, Daniele Canavese, Jerome d’Annoville, Bjorn De Sutter, Fulvio Valenza
Tags: Security Metrics
Year: 2015
-
Making Advanced Software Protection Tools Usable for Non-Experts
Authors: Bjorn De Sutter
Tags: Obfuscation Techniques
Year: 2015
-
Assessment of data obfuscation with residue number coding.
2015 IEEE/ACM 1st International Workshop on Software Protection. Pages 38-44. IEEE
Authors: Biniam Fisseha Demissie, Mariano Ceccato, Roberto Tiella
Tags: Evaluation, Obfuscation Techniques
Year: 2015
-
Automatische injectie van flexibele opake predicaten
Authors: Thomas Van Cleemput
Tags: Obfuscation Techniques
Year: 2015