Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022 - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

CarePlus: A general framework for hardware performance counter based malware detection under system resource competition

Y Hu, S Li, W Xue, Y Zhao, Y Wen - Computers & Security, 2024 - Elsevier
Hardware performance counter (HPC) has been used for malware detection because of its
lightweight overhead. Unfortunately, such detection models including their software …

Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments

M Botacin - Digital Threats: Research and Practice, 2024 - dl.acm.org
In real life, distinct runs of the same artifact lead to the exploration of different paths, due to
either system's natural randomness or malicious constructions. These variations might …

Program Synthesis-based Simplification of MBA Obfuscated Malware with Restart Strategies

S Kang, J Kim, ES Cho, S Choi - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Program obfuscation is one of the frequently used methods to make malware hard to
analyze. Among the various obfuscation techniques, Mixed Boolean-Arithmetic (MBA) …

LifeLine for FPGA protection: Obfuscated cryptography for real-world security

F Stolz, N Albartus, J Speith, S Klix… - Cryptology ePrint …, 2021 - eprint.iacr.org
Over the last decade attacks have repetitively demonstrated that bitstream protection for
SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence …

CARE: Enabling hardware performance counter based malware detection resilient to system resource competition

Y Hu, S Liang, M Li, T Xue, BY Zhang… - 2022 IEEE 24th Int Conf …, 2022 - ieeexplore.ieee.org
Hardware performance counter (HPC) has been widely used for learning based malware
detection model because of its light-weight overhead and universality. Unfortunately, we find …

HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method

Y Hu, S Li, B Zhang, X Cheng… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Hardware performance counter (HPC) has been widely used in malware detection because
of its low access overhead and the ability of revealing dynamic behavior during program's …

Secure Decentralized Learning with Incentives on UTXO-based Blockchains

L Lunardon - 2023 IEEE International Conference on Omni …, 2023 - ieeexplore.ieee.org
Increasing computational and economic costs in training artificial intelligence motivate the
development of alternative decentralized training paradigms. Federated learning achieves …

Black-box code analysis for reverse engineering through constraint acquisition and program synthesis

G Menguy - 2023 - theses.hal.science
Software always becomes larger and more complex, making crucial tasks like code testing,
verification, or code understanding highly difficult for humans. Hence the need for methods …

Resilience of code obfuscation to optimization and fuzzing

F Lopes - 2022 - search.proquest.com
Code obfuscation is being widely used not only to mask code in commercial products but
also to obfuscate malware code. These obfuscations are made so that it is much harder to …