Zobrazeno 1 - 10
of 175
pro vyhledávání: '"de Sutter, Bjorn"'
Autor:
Zhang, Tab, Taylor, Claire, Coppens, Bart, Mebane, Waleed, Collberg, Christian, De Sutter, Bjorn
This paper introduces reAnalyst, a scalable analysis framework designed to facilitate the study of reverse engineering (RE) practices through the semi-automated annotation of RE activities across various RE tools. By integrating tool-agnostic data co
Externí odkaz:
http://arxiv.org/abs/2406.04427
Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attac
Externí odkaz:
http://arxiv.org/abs/2307.07300
The last years have seen an increase in Man-at-the-End (MATE) attacks against software applications, both in number and severity. However, software protection, which aims at mitigating MATE attacks, is dominated by fuzzy concepts and security-through
Externí odkaz:
http://arxiv.org/abs/2303.15033
To counter software reverse engineering or tampering, software obfuscation tools can be used. However, such tools to a large degree hard-code how the obfuscations are deployed. They hence lack resilience and stealth in the face of many attacks. To co
Externí odkaz:
http://arxiv.org/abs/2012.12603
The last years have seen an increase of Man-at-the-End (MATE) attacks against software applications, both in number and severity. However, MATE software protections are dominated by fuzzy concepts and techniques, with security-through-obscurity omnip
Externí odkaz:
http://arxiv.org/abs/2011.07269
General Matrix Multiplication or GEMM kernels take centre place in high performance computing and machine learning. Recent NVIDIA GPUs include GEMM accelerators, such as NVIDIA's Tensor Cores. Their exploitation is hampered by the two-language proble
Externí odkaz:
http://arxiv.org/abs/2009.12263
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opp
Externí odkaz:
http://arxiv.org/abs/2004.06417
Autor:
Abrath, Bert, Coppens, Bart, Broeck, Jens Van den, Wyseur, Brecht, Cabutto, Alessandro, Falcarin, Paolo, De Sutter, Bjorn
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This paper presents an architecture and supporting tool flow to renew parts of native applications dynamically.
Externí odkaz:
http://arxiv.org/abs/2003.00916
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application. It is well-known, however, that attackers can exploit the modular
Externí odkaz:
http://arxiv.org/abs/1907.01445
We show how forward-mode automatic differentiation (AD) can be employed within larger reverse-mode computations to dynamically differentiate broadcast operations in a GPU-friendly manner. Our technique fully exploits the broadcast Jacobian's inherent
Externí odkaz:
http://arxiv.org/abs/1810.08297