-
Automatic Generation of Opaque Constants Based on the K-clique Problem for Resilient Data Obfuscation
IEEE International Conference on Software Analysis Evolution, and Reengineering
Authors: Roberto Tiella, Mariano Ceccato
Tags:
Year: 2017
-
A reference architecture for software protection
IEEE/IFIP Conference on Software Architecture
Authors: Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
Tags:
Year: 2016
-
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams
International Symposium on Empirical Software Engineering and Measurements
Authors: Mariano Ceccato, Riccardo Scandariato
Tags:
Year: 2016
-
Search Based Clustering for Protecting Software with Diversified Updates
Symposium on Search-Based Software Engineering
Authors: Mariano Ceccato, Paolo Falcarin, Alessandro Cabutto, Yosief Weldezghi Frezghi, Cristian-Alexandru Staicu
Tags:
Year: 2016
-
Assessment of Source Code Obfuscation Techniques.
ssessment of Source Code Obfuscation Techniques. IEEE International Working Conference on Source Code Analysis and Manipulation SCAM
Authors: Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella
Tags: Evaluation, Obfuscation Techniques
Year: 2016
-
Attack simulation based software protection assessment method
International Conference On Cyber Security and Protection of Digital Services
Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville
Tags:
Year: 2016
-
Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart CopReactive attestation. Automatic detection and reaction to software tampering attacks
2016 ACM Workshop on Software PROtection
Authors: Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens
Tags:
Year: 2016
-
Bjorn De Sutter, Jerome D’Annoville. Attack Simulation based Software Protection Assessment Method with Petri NetI
International Journal on Cyber Situational Awareness
Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville.
Tags:
Year: 2016
-
Tightly-Coupled Self-Debugging Software Protection
International Workshop on Software Security, Protection and reverse Engineering
Authors: Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert
Tags:
Year: 2016
-
An Experimental Study on Run-Time Overhead Introduced by Data Obfuscation Transformations
Transformations Master Thesis, University of Trento
Authors: Alessandro Valentini
Tags:
Year: 2016
-
The ASPIRE Framework for Software Protection
2016 ACM Workshop on Software PROtection
Authors: Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome d'Annoville
Tags: Obfuscation Techniques
Year: 2016
-
Automatische injectie van flexibele opake predicaten
Authors: Thomas Van Cleemput
Tags: Obfuscation Techniques
Year: 2015
-
SAD Droid: Zelf-Anti-Debugging voor Android
Authors: Joris Wijnant
Tags: Obfuscation Techniques
Year: 2015
-
Software Protection with Code Mobility
MTD '15 Proceedings of the Second ACM Workshop on Moving Target Defense, pp 95-103, ACM, ISBN: 978-1-4503-3823-3
Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
Tags: Obfuscation Techniques, Reverse Engineering
Year: 2015
-
Software Protection with Code Mobility
Second Workshop on Moving Target Defense MTD@CCS
Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
Tags: Obfuscation Techniques
Year: 2015