| Register

Publication database

  • Automatic Generation of Opaque Constants Based on the K-clique Problem for Resilient Data Obfuscation

    IEEE International Conference on Software Analysis Evolution, and Reengineering
    Authors: Roberto Tiella, Mariano Ceccato
    Tags:
    Year: 2017
  • A reference architecture for software protection

    IEEE/IFIP Conference on Software Architecture
    Authors: Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
    Tags:
    Year: 2016
  • Static Analysis and Penetration Testing from the Perspective of Maintenance Teams

    International Symposium on Empirical Software Engineering and Measurements
    Authors: Mariano Ceccato, Riccardo Scandariato
    Tags:
    Year: 2016
  • Search Based Clustering for Protecting Software with Diversified Updates

    Symposium on Search-Based Software Engineering
    Authors: Mariano Ceccato, Paolo Falcarin, Alessandro Cabutto, Yosief Weldezghi Frezghi, Cristian-Alexandru Staicu
    Tags:
    Year: 2016
  • Assessment of Source Code Obfuscation Techniques.

    ssessment of Source Code Obfuscation Techniques. IEEE International Working Conference on Source Code Analysis and Manipulation SCAM
    Authors: Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella
    Tags: Evaluation, Obfuscation Techniques
    Year: 2016
  • Attack simulation based software protection assessment method

    International Conference On Cyber Security and Protection of Digital Services
    Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville
    Tags:
    Year: 2016
  • Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart CopReactive attestation. Automatic detection and reaction to software tampering attacks

    2016 ACM Workshop on Software PROtection
    Authors: Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens
    Tags:
    Year: 2016
  • Bjorn De Sutter, Jerome D’Annoville. Attack Simulation based Software Protection Assessment Method with Petri NetI

    International Journal on Cyber Situational Awareness
    Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D’Annoville.
    Tags:
    Year: 2016
  • Tightly-Coupled Self-Debugging Software Protection

    International Workshop on Software Security, Protection and reverse Engineering
    Authors: Bert Abrath, Joris Wijnant, Bart Coppens, Bjorn De Sutter, and Stijn Volckaert
    Tags:
    Year: 2016
  • An Experimental Study on Run-Time Overhead Introduced by Data Obfuscation Transformations

    Transformations Master Thesis, University of Trento
    Authors: Alessandro Valentini
    Tags:
    Year: 2016
  • The ASPIRE Framework for Software Protection

    2016 ACM Workshop on Software PROtection
    Authors: Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome d'Annoville
    Tags: Obfuscation Techniques
    Year: 2016
  • Automatische injectie van flexibele opake predicaten

    Authors: Thomas Van Cleemput
    Tags: Obfuscation Techniques
    Year: 2015
  • SAD Droid: Zelf-Anti-Debugging voor Android

    Authors: Joris Wijnant
    Tags: Obfuscation Techniques
    Year: 2015
  • Software Protection with Code Mobility

    MTD '15 Proceedings of the Second ACM Workshop on Moving Target Defense, pp 95-103, ACM, ISBN: 978-1-4503-3823-3
    Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
    Tags: Obfuscation Techniques, Reverse Engineering
    Year: 2015
  • Software Protection with Code Mobility

    Second Workshop on Moving Target Defense MTD@CCS
    Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
    Tags: Obfuscation Techniques
    Year: 2015

Pages