-
Automatische injectie van flexibele opake predicaten
Authors: Thomas Van Cleemput
Tags: Obfuscation Techniques
Year: 2015
-
SAD Droid: Zelf-Anti-Debugging voor Android
Authors: Joris Wijnant
Tags: Obfuscation Techniques
Year: 2015
-
Software Protection with Code Mobility
MTD '15 Proceedings of the Second ACM Workshop on Moving Target Defense, pp 95-103, ACM, ISBN: 978-1-4503-3823-3
Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
Tags: Obfuscation Techniques, Reverse Engineering
Year: 2015
-
Software Protection with Code Mobility
Second Workshop on Moving Target Defense MTD@CCS
Authors: Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
Tags: Obfuscation Techniques
Year: 2015
-
On the need for more human studies to assess software protection.
ARO Workshop on Continuously Upgradeable Software Security and Protection, pages 55-56, November 2014.
Authors: Mariano Ceccato
Tags: Evaluation
Year: 2014
-
A measurement framework to quantify software protections
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 1505-1507, New York, NY, USA, 2014. ACM.
Authors: Paolo Tonella, Mairano Ceccato, Bjorn De Sutter, and Bart Coppens
Tags: Evaluation, Metrics
Year: 2014
-
Implementation and Assessment of Data Obfuscation for C/C++ Code Based on Residue Number Coding
Master Thesis. University of Trento. Department of Information Engineering and Computer Science
Authors: Biniam Fisseha Demissie
Tags: Evaluation, Obfuscation Techniques
Year: 2014
-
Code Diversity: Code Obfuscation and Clustering Heuristic to Prevent Code Tampering
Final Thesis. University of Trento. Department of Information Engineering and Computer Science
Authors: Yosief Weldezghi Frezghi
Tags: Evaluation, Obfuscation Techniques
Year: 2014
-
Understanding programs that don't want to be understood
Presentation at Dagstuhl Seminar 14241 - Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy
Authors: Saumya Debray and others
Tags: Reverse Engineering
Year: 2014
-
Towards a Unified Framework for Evaluating the Strength of Software Protections (Extended Abstract)
Authors: Bjorn De Sutter
Tags: Metrics
Year: 2014
-
Brecht Wyseur Reflections on Software Renewability from an Industry Perspective (Extended Abstract)
Authors: Brecht Wyseur
Tags:
Year: 2014
-
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Empirical Software Engineering
Authors: Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella
Tags: Evaluation
Year: 2014
-
A Large Study on the Effect of Code Obfuscation on the Quality of Java Code
Empirical Software Engineering
Authors: Mariano Ceccato, Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff
Tags: Evaluation
Year: 2014
-
Evaluating the Strength of Software Protections (Abstract)
Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy, Dagstuhl Seminar 14241
Authors: Bjorn De Sutter
Tags: Metrics
Year: 2014
-
Feedback-driven binary code diversification
ACM Trans. Archit. Code Optim. 9, 4, Article 24 (January 2013), 26 pages
Authors: Bart Coppens, Bjorn De Sutter, and Jonas Maebe
Tags: Obfuscation Techniques
Year: 2013