| Register

Papers

  • Automatic Generation of Opaque Constants Based on the K-clique Problem for Resilient Data Obfuscation

    IEEE International Conference on Software Analysis Evolution, and Reengineering
    Authors: Roberto Tiella, Mariano Ceccato
    Tags:
    Year: 2017
  • A reference architecture for software protection

    IEEE/IFIP Conference on Software Architecture
    Authors: Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
    Tags:
    Year: 2016
  • Static Analysis and Penetration Testing from the Perspective of Maintenance Teams

    International Symposium on Empirical Software Engineering and Measurements
    Authors: Mariano Ceccato, Riccardo Scandariato
    Tags:
    Year: 2016
  • Search Based Clustering for Protecting Software with Diversified Updates

    Symposium on Search-Based Software Engineering
    Authors: Mariano Ceccato, Paolo Falcarin, Alessandro Cabutto, Yosief Weldezghi Frezghi, Cristian-Alexandru Staicu
    Tags:
    Year: 2016
  • Assessment of Source Code Obfuscation Techniques.

    ssessment of Source Code Obfuscation Techniques. IEEE International Working Conference on Source Code Analysis and Manipulation SCAM
    Authors: Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella
    Tags: Evaluation, Obfuscation Techniques
    Year: 2016
  • Attack simulation based software protection assessment method

    International Conference On Cyber Security and Protection of Digital Services
    Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville
    Tags:
    Year: 2016
  • Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart CopReactive attestation. Automatic detection and reaction to software tampering attacks

    2016 ACM Workshop on Software PROtection
    Authors: Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens
    Tags:
    Year: 2016
  • Bjorn De Sutter, Jerome D’Annoville. Attack Simulation based Software Protection Assessment Method with Petri NetI

    International Journal on Cyber Situational Awareness
    Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville.
    Tags:
    Year: 2016
  • Tightly-Coupled Self-Debugging Software Protection

    International Workshop on Software Security, Protection and reverse Engineering
    Authors: Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert
    Tags:
    Year: 2016
  • The ASPIRE Framework for Software Protection

    2016 ACM Workshop on Software PROtection
    Authors: Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome d'Annoville
    Tags: Obfuscation Techniques
    Year: 2016
  • Automatic discovery of software attacks via backward reasoning

    Authors: Cataldo Basile, Daniele Canavese, Jerome d’Annoville, Bjorn De Sutter, Fulvio Valenza
    Tags: Security Metrics
    Year: 2015
  • Making Advanced Software Protection Tools Usable for Non-Experts

    Authors: Bjorn De Sutter
    Tags: Obfuscation Techniques
    Year: 2015
  • Assessment of data obfuscation with residue number coding.

    2015 IEEE/ACM 1st International Workshop on Software Protection. Pages 38-44. IEEE
    Authors: Biniam Fisseha Demissie, Mariano Ceccato, Roberto Tiella
    Tags: Evaluation, Obfuscation Techniques
    Year: 2015
  • Automatische injectie van flexibele opake predicaten

    Authors: Thomas Van Cleemput
    Tags: Obfuscation Techniques
    Year: 2015
  • SAD Droid: Zelf-Anti-Debugging voor Android

    Authors: Joris Wijnant
    Tags: Obfuscation Techniques
    Year: 2015

Pages