-
Method to Evaluate Software Protection Based on Attack Modeling
International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing
Authors: Huaijun Wang and Dingyi Fang and Ni Wang and Zhanyong Tang and Feng Chen and Yuanxiang Gu
Tags:
Year: 2013
-
An Empirical Study of Metric-Based Methods to Detect Obfuscated Code
International Journal of Security & Its Applications
Authors: Corrado Visaggio, Giuseppe Pagin, Gerardo Canfora
Tags: Evaluation
Year: 2013
-
Feedback-driven binary code diversification
ACM Trans. Archit. Code Optim. 9, 4, Article 24 (January 2013), 26 pages
Authors: Bart Coppens, Bjorn De Sutter, and Jonas Maebe
Tags: Obfuscation Techniques
Year: 2013
-
Protecting Your Software Updates
IEEE Security and Privacy 11, 2 (March 2013), 47-54
Authors: Bart Coppens, Bjorn De Sutter, and Koen De Bosschere
Tags: Obfuscation Techniques
Year: 2013
-
Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD)
Authors: Haruaki Tamada, Kazumasa Fukuda, Tomoya Yoshioka
Tags: Security Metrics
Year: 2012
-
Towards Static Analysis of Virtualization-Obfuscated Binaries
Working Conference on Reverse Engineering
Authors: Johannes Kinder
Tags: Reverse Engineering
Year: 2012
-
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis
Authors: Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang
Tags: Obfuscation Techniques
Year: 2011
-
Deobfuscation of Virtualization-obfuscated Software: A Semantics-based Approach
Authors: Kevin Coogan, Gen Lu, Saumya Debray
Tags: Reverse Engineering
Year: 2011
-
The effectiveness of source code obfuscation: An experimental assessment
IEEE 17th International Conference on Program Comprehension
Authors: Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella
Tags: Evaluation
Year: 2009
-
Underlying Cognitive Complexity Measure Computation with Combinatorial Rules
Proceedings of World Academy of Science: Engineering & Technology
Authors: B. Auprasert, Y. Limpiyakorn
Tags: Metrics
Year: 2008
-
Improved Memory-access Analysis for x86 Executables
Proceedings of the Joint European Conferences on Theory and Practice of Software 17th International Conference on Compiler Construction
Authors: Thomas Reps, Gogul Balakrishnan
Tags: Program Analysis
Year: 2008
-
Program obfuscation: a quantitative approach
ACM Workshop on Quality of protection
Authors: Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel
Tags: Security Metrics
Year: 2007
-
An empirical examination of the reverse engineering process for binary files
Authors: Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
Tags: Reverse Engineering
Year: 2006
-
Deobfuscation: Reverse Engineering Obfuscated Code
Working Conference on Reverse Engineering
Authors: Sharath Udupa, Saumya Debray, Matias Madou
Tags: Reverse Engineering
Year: 2005
-
Obfuscation of executable code to improve resistance to static disassembly
Authors: Cullen Linn, Saumya Debray
Tags: Obfuscation Techniques
Year: 2003