Context Software diversity, self-modification, and obfuscation have many applications in software security and attack resilience. For example, software diversity schemes creating individualized binaries can, by scrambling memory and code layout, make unified exploits which are successful against all installations of one software product, much harder or even infeasible. Self-modification can help against runtime analysis, attacks, and binary patching which would, e.g., remove key, authorization, or integrity checks. Self-modification might also be used to other ends, e.g., to build cryptography on top of it. Obfuscation is commonly applied to protect programs against analysis and reverse engineering. While the aforementioned concepts may not...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Abstract Context: Diversification and obfuscation are promising techniques for securing software and...
International audienceThe predictability of program execution provides attackers a rich source of kn...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
A set of replicas is diverse to the extent that all implement the same functionality but differ in ...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
A set of replicas is diverse to the extent that all implement the same functionality but differ in t...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Abstract Context: Diversification and obfuscation are promising techniques for securing software and...
International audienceThe predictability of program execution provides attackers a rich source of kn...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
A set of replicas is diverse to the extent that all implement the same functionality but differ in ...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
A set of replicas is diverse to the extent that all implement the same functionality but differ in t...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
International audienceThe risk of code reverse-engineering is particularly acute for embedded proces...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Abstract Context: Diversification and obfuscation are promising techniques for securing software and...
International audienceThe predictability of program execution provides attackers a rich source of kn...