Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Bert Abrath"'
Publikováno v:
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
Autor:
Jonas Vinck, Bert Abrath, Bart Coppens, Alexios Voulimeneas, Bjorn De Sutter, Stijn Volckaert
Publikováno v:
Proceedings of the Seventeenth European Conference on Computer Systems.
ispartof: pages:99-116 ispartof: EuroSys '22: Seventeenth European Conference on Computer Systems pages:99-116 ispartof: European Conference on Computer Systems location:Rennes, FR date:5 Apr - 8 Apr 2022 status: published
Autor:
Bjorn De Sutter, Alessandro Cabutto, Bert Abrath, Brecht Wyseur, Paolo Falcarin, Bart Coppens, Jens Van den Broeck
Publikováno v:
ACM Transactions on Privacy and Security. 23:1-31
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This paper presents an architecture and supporting tool flow to renew parts of native applications dynamically.
Publikováno v:
SSPREW@ACSAC
Existing anti-debugging protections are relatively weak. In existing self-debugger approaches, a custom debugger is attached to the main application, of which the control flow is obfuscated by redirecting it through the debugger. The coupling between
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-1
This paper introduces ��Breakpad. It extends the Breakpad crash reporting system to handle software diversity effectively and efficiently by replicating and patching the debug information of diversified software versions. Simple adaptations to ex
Autor:
Alessio Viticchié, Cataldo Basile, Bert Abrath, Mariano Ceccato, Bart Coppens, Andrea Avancini
Publikováno v:
SPRO@CCS
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampered programs. tamper detection assesses programs’ integrity with load- or execution-time checks. Avoidance reacts to tampered programs by stopping o
Publikováno v:
2015 IEEE/ACM 1st International Workshop on Software Protection.
Publikováno v:
MTD@CCS
The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, identifying sensitive algorithms or tamper with the code to disable pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::303024376ba99f7525432b226915da52
http://hdl.handle.net/10278/3746434
http://hdl.handle.net/10278/3746434
Publikováno v:
Ghent University Academic Bibliography
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
EuroS&P Workshops
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
EuroS&P Workshops
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a4b2725fefe70953d40953ab11911991
https://biblio.ugent.be/publication/8668175
https://biblio.ugent.be/publication/8668175