When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the extraction or manipulation of such critical assets. The process and strategy followed by hackers to understand and tamper with protected software might differ from program understanding for benign purposes. Knowledge of the actual hacker behaviours while performing real attack tasks can inform better ways to protect the software and can provide more realistic assumptions to the developers, evaluators, and users of software protections. Within Aspire, a software protection research project funded by the EU under framework programme FP7, we have conducted three industrial case studies with t...
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the wa...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Context: Security is a growing concern in many organizations. Industries developing software systems...
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the wa...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. T...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
Context: Security is a growing concern in many organizations. Industries developing software systems...
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the wa...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...