-
Obfuscating Windows DLLs
Authors: Bert Abrath, Bart Coppens, Stijn Volckaert, Bjorn De Sutter
Tags: Obfuscation Techniques
Year: 2015
-
Automatic discovery of software attacks via backward reasoning
Authors: Cataldo Basile, Daniele Canavese, Jerome d’Annoville, Bjorn De Sutter, Fulvio Valenza
Tags: Security Metrics
Year: 2015
-
Making Advanced Software Protection Tools Usable for Non-Experts
Authors: Bjorn De Sutter
Tags: Obfuscation Techniques
Year: 2015
-
Assessment of data obfuscation with residue number coding.
2015 IEEE/ACM 1st International Workshop on Software Protection. Pages 38-44. IEEE
Authors: Biniam Fisseha Demissie, Mariano Ceccato, Roberto Tiella
Tags: Evaluation, Obfuscation Techniques
Year: 2015
-
On the need for more human studies to assess software protection.
ARO Workshop on Continuously Upgradeable Software Security and Protection, pages 55-56, November 2014.
Authors: Mariano Ceccato
Tags: Evaluation
Year: 2014
-
A measurement framework to quantify software protections
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 1505-1507, New York, NY, USA, 2014. ACM.
Authors: Paolo Tonella, Mairano Ceccato, Bjorn De Sutter, and Bart Coppens
Tags: Evaluation, Metrics
Year: 2014
-
Implementation and Assessment of Data Obfuscation for C/C++ Code Based on Residue Number Coding
Master Thesis. University of Trento. Department of Information Engineering and Computer Science
Authors: Biniam Fisseha Demissie
Tags: Evaluation, Obfuscation Techniques
Year: 2014
-
Code Diversity: Code Obfuscation and Clustering Heuristic to Prevent Code Tampering
Final Thesis. University of Trento. Department of Information Engineering and Computer Science
Authors: Yosief Weldezghi Frezghi
Tags: Evaluation, Obfuscation Techniques
Year: 2014
-
Understanding programs that don't want to be understood
Presentation at Dagstuhl Seminar 14241 - Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy
Authors: Saumya Debray and others
Tags: Reverse Engineering
Year: 2014
-
Towards a Unified Framework for Evaluating the Strength of Software Protections (Extended Abstract)
Authors: Bjorn De Sutter
Tags: Metrics
Year: 2014
-
Brecht Wyseur Reflections on Software Renewability from an Industry Perspective (Extended Abstract)
Authors: Brecht Wyseur
Tags:
Year: 2014
-
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Empirical Software Engineering
Authors: Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella
Tags: Evaluation
Year: 2014
-
A Large Study on the Effect of Code Obfuscation on the Quality of Java Code
Empirical Software Engineering
Authors: Mariano Ceccato, Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff
Tags: Evaluation
Year: 2014
-
Evaluating the Strength of Software Protections (Abstract)
Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy, Dagstuhl Seminar 14241
Authors: Bjorn De Sutter
Tags: Metrics
Year: 2014
-
It really does matter how you normalize the branch distance in search-based software testing
Software Testing, Verification and Reliability
Authors: Andrea Arcuri
Tags: Metrics
Year: 2013