In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts. However, little information seems to be available on the implementation aspects or cost of the different schemes. This paper tries to fill the gap by presenting our experience with several encryption techniques: bulk encryption, an on-demand decryption scheme, and a combination of both techniques. Our scheme offers maximal protection against both static and dynamic code analysis and tampering. We validate our techniques by applying them on several benchmark programs of the CPU2006 Test Suite. And finally, we propose a heuristic which trades off security versus performance, resulting in a decrease of the runtime overhead. © ...
Software applications which run in a compromised environment and perform sensitive operations, such ...
International audienceWe present an approach and a tool to answer the need for effective, generic, a...
This thesis contributes to three research areas in software security, namely security requirements a...
In recent years, many have suggested to apply encryption in the domain of software protection agains...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
An important aspect of protecting software from attack, theft of algorithms, or illegal software use...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract: An important and recurring security scenario involves the need to carry out trusted comput...
Security is a concern in the design of a wide range of embedded sys-tems. Extensive research has bee...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
In software protection we typically have to deal with the white-box attack model. In this model an a...
International audienceIn this paper, we consider that, in practice, attack scenarios involving side-...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Software applications which run in a compromised environment and perform sensitive operations, such ...
International audienceWe present an approach and a tool to answer the need for effective, generic, a...
This thesis contributes to three research areas in software security, namely security requirements a...
In recent years, many have suggested to apply encryption in the domain of software protection agains...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
An important aspect of protecting software from attack, theft of algorithms, or illegal software use...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract: An important and recurring security scenario involves the need to carry out trusted comput...
Security is a concern in the design of a wide range of embedded sys-tems. Extensive research has bee...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
In software protection we typically have to deal with the white-box attack model. In this model an a...
International audienceIn this paper, we consider that, in practice, attack scenarios involving side-...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Software applications which run in a compromised environment and perform sensitive operations, such ...
International audienceWe present an approach and a tool to answer the need for effective, generic, a...
This thesis contributes to three research areas in software security, namely security requirements a...