| Register

Publication database

  • Method to Evaluate Software Protection Based on Attack Modeling

    International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing
    Authors: Huaijun Wang and Dingyi Fang and Ni Wang and Zhanyong Tang and Feng Chen and Yuanxiang Gu
    Tags:
    Year: 2013
  • An Empirical Study of Metric-Based Methods to Detect Obfuscated Code

    International Journal of Security & Its Applications
    Authors: Corrado Visaggio, Giuseppe Pagin, Gerardo Canfora
    Tags: Evaluation
    Year: 2013
  • Feedback-driven binary code diversification

    ACM Trans. Archit. Code Optim. 9, 4, Article 24 (January 2013), 26 pages
    Authors: Bart Coppens, Bjorn De Sutter, and Jonas Maebe
    Tags: Obfuscation Techniques
    Year: 2013
  • Protecting Your Software Updates

    IEEE Security and Privacy 11, 2 (March 2013), 47-54
    Authors: Bart Coppens, Bjorn De Sutter, and Koen De Bosschere
    Tags: Obfuscation Techniques
    Year: 2013
  • Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model

    ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD)
    Authors: Haruaki Tamada, Kazumasa Fukuda, Tomoya Yoshioka
    Tags: Security Metrics
    Year: 2012
  • Towards Static Analysis of Virtualization-Obfuscated Binaries

    Working Conference on Reverse Engineering
    Authors: Johannes Kinder
    Tags: Reverse Engineering
    Year: 2012
  • Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis

    Journal of Multimedia
    Authors: Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang
    Tags: Obfuscation Techniques
    Year: 2011
  • Deobfuscation of Virtualization-obfuscated Software: A Semantics-based Approach

    CCS
    Authors: Kevin Coogan, Gen Lu, Saumya Debray
    Tags: Reverse Engineering
    Year: 2011
  • The effectiveness of source code obfuscation: An experimental assessment

    IEEE 17th International Conference on Program Comprehension
    Authors: Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella
    Tags: Evaluation
    Year: 2009
  • Underlying Cognitive Complexity Measure Computation with Combinatorial Rules

    Proceedings of World Academy of Science: Engineering & Technology
    Authors: B. Auprasert, Y. Limpiyakorn
    Tags: Metrics
    Year: 2008
  • Improved Memory-access Analysis for x86 Executables

    Proceedings of the Joint European Conferences on Theory and Practice of Software 17th International Conference on Compiler Construction
    Authors: Thomas Reps, Gogul Balakrishnan
    Tags: Program Analysis
    Year: 2008
  • Program obfuscation: a quantitative approach

    ACM Workshop on Quality of protection
    Authors: Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel
    Tags: Security Metrics
    Year: 2007
  • An empirical examination of the reverse engineering process for binary files

    Computers & Security
    Authors: Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
    Tags: Reverse Engineering
    Year: 2006
  • Deobfuscation: Reverse Engineering Obfuscated Code

    Working Conference on Reverse Engineering
    Authors: Sharath Udupa, Saumya Debray, Matias Madou
    Tags: Reverse Engineering
    Year: 2005
  • Obfuscation of executable code to improve resistance to static disassembly

    CCS
    Authors: Cullen Linn, Saumya Debray
    Tags: Obfuscation Techniques
    Year: 2003

Pages