Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- tutorialJanuary 2014
Analyzing program dependencies for malware detection
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 6, pp 1–7https://doi.org/10.1145/2556464.2556470Metamorphic malware continuously modify their code, while preserving their functionality, in order to foil misuse detection. The key for defeating metamorphism relies in a semantic characterization of the embedding of the malware into the target ...
- tutorialJanuary 2014
TDVMP: Improved Virtual Machine-Based Software Protection with Time Diversity
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 4, pp 1–9https://doi.org/10.1145/2556464.2556468The VM (Virtual effective solution to protect software, making it extremely a Machine)-based software protection technique provides difficulty to analyze and crack. In this paper, we improve it from two aspects. Firstly, the time diversity is to fight ...
- tutorialJanuary 2014
DroidLegacy: Automated Familial Classification of Android Malware
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 3, pp 1–12https://doi.org/10.1145/2556464.2556467We present an automated method for extracting familial signatures for Android malware, i.e., signatures that identify malware produced by piggybacking potentially different benign applications with the same (or similar) malicious code. The APK classes ...
- tutorialJanuary 2014
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security
PPREW'14: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014January 2014, Article No.: 2, pp 1–10https://doi.org/10.1145/2556464.2556466In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al. as future work, ...