Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3015135acmotherconferencesBook PagePublication PagesssprewConference Proceedingsconference-collections
SSPREW '16: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SSPREW '16: Software Security, Protection, and Reverse Engineering Workshop Los Angeles California USA December 5 - 6, 2016
ISBN:
978-1-4503-4841-6
Published:
05 December 2016

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Metadata recovery from obfuscated programs using machine learning
Article No.: 1, Pages 1–11https://doi.org/10.1145/3015135.3015136

Obfuscation is a mechanism used to hinder reverse engineering of programs. To cope with the large number of obfuscated programs, especially malware, reverse engineers automate the process of deobfuscation i.e. extracting information from obfuscated ...

research-article
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free
Article No.: 2, Pages 1–12https://doi.org/10.1145/3015135.3015137

This paper presents a fully automated technique to find and trigger Use-After-Free vulnerabilities (UAF) on binary code. The approach combines a static analyzer and a dynamic symbolic execution engine. We also introduce several original heuristics for ...

research-article
Public Access
Detecting rootkits with the RAI runtime application inventory
Article No.: 3, Pages 1–12https://doi.org/10.1145/3015135.3015138

Remotely determining which precise code is running on which machines is hard. This is especially true if the monitored machines lack modern security features and may be under malware attack, since in such a scenario the malware may have already ...

research-article
White-box cryptography: practical protection on hostile hosts
Article No.: 4, Pages 1–8https://doi.org/10.1145/3015135.3015139

Businesses often interact with users via web-browsers and applications on mobile devices, and host services on cloud servers they may not own. Such highly-exposed environments employ white-box cryptography (WBC) for security protection. WBC operates on ...

research-article
Active Android malware analysis: an approach based on stochastic games
Article No.: 5, Pages 1–10https://doi.org/10.1145/3015135.3015140

Active Malware Analysis focuses on learning the behaviors and the intentions of a malicious piece of software by interacting with it in a safe environment. The process can be formalized as a stochastic game involving two agents, a malware sample and an ...

research-article
Buffer overflow attack's power consumption signatures
Article No.: 6, Pages 1–7https://doi.org/10.1145/3015135.3015141

Embedded Systems (ES) are an integral part of Cyber-Physical Systems (CPS), the Internet of Things (IoT), and consumer devices like smartphones. ES often have limited resources, and - if used in CPS and IoT - have to satisfy real time requirements. ...

research-article
Tightly-coupled self-debugging software protection
Article No.: 7, Pages 1–10https://doi.org/10.1145/3015135.3015142

Existing anti-debugging protections are relatively weak. In existing self-debugger approaches, a custom debugger is attached to the main application, of which the control flow is obfuscated by redirecting it through the debugger. The coupling between ...

research-article
Comparing the effectiveness of commercial obfuscators against MATE attacks
Article No.: 8, Pages 1–11https://doi.org/10.1145/3015135.3015143

The ability to protect software from malicious reverse engineering remains a challenge faced by commercial software companies who invest a large amount of resources in the development of their software product. In order to protect their investment from ...

Contributors
  • University of South Alabama
  • University of Verona
  • University of Saskatchewan

Recommendations

Acceptance Rates

Overall Acceptance Rate 6 of 13 submissions, 46%
YearSubmittedAcceptedRate
SSPREW-713646%
Overall13646%