Code obfuscation is a major tool for protecting software intellectual property from attacks such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks based on Dynamic Symbolic Execution (DSE) shows very promising results, hence threatening software integrity. Current defenses are not fully satisfactory, being either not efficient against symbolic reasoning, or affecting runtime performance too much, or being too easy to spot. We present and study a new class of anti-DSE protections coined as path-oriented protections targeting the weakest spot of DSE, namely path exploration. We propose a lightweight, efficient, resistant and analytically proved class of obfuscation algorithms designed to hinder DSE-based att...
Assessing software robustness became arduous given the broad adoption of obfuscation in the industry...
Unauthorized code modification based on reverse engineering is a serious threat for software industr...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Software obfuscation is a crucial technology to protect intellectual property and manage digital rig...
Symbolic and concolic execution find important applications in a number of security-related program ...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
Software obfuscation is a crucial technology to protect intellectual property and manage digital rig...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Abstract- The path constraints are leaked by binary conditional jump instructions which are the bina...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
International audienceControl flow obfuscation techniques can be used to hinder software r...
Assessing software robustness became arduous given the broad adoption of obfuscation in the industry...
Unauthorized code modification based on reverse engineering is a serious threat for software industr...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Software obfuscation is a crucial technology to protect intellectual property and manage digital rig...
Symbolic and concolic execution find important applications in a number of security-related program ...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
Software obfuscation is a crucial technology to protect intellectual property and manage digital rig...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Abstract- The path constraints are leaked by binary conditional jump instructions which are the bina...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
International audienceControl flow obfuscation techniques can be used to hinder software r...
Assessing software robustness became arduous given the broad adoption of obfuscation in the industry...
Unauthorized code modification based on reverse engineering is a serious threat for software industr...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...