2016
DOI: 10.1007/978-3-319-47106-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Search Based Clustering for Protecting Software with Diversified Updates

Abstract: Reverse engineering is usually the stepping stone of a variety of attacks aiming at identifying sensitive information (keys, credentials, data, algorithms) or vulnerabilities and flaws for broader exploitation. Software applications are usually deployed as identical binary code installed on millions of computers, enabling an adversary to develop a generic reverse-engineering strategy that, if working on one code instance, could be applied to crack all the other instances. A solution to mitigate this problem is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…They argued that there are some characteristics of the execution that are strictly correlated with the underlying logic of the code which are invariant after applying obfuscation. The search for the optimal obfuscation configuration has been done by Ceccato et al [34] in case of software diversity but using static metrics.…”
Section: Related Workmentioning
confidence: 99%
“…They argued that there are some characteristics of the execution that are strictly correlated with the underlying logic of the code which are invariant after applying obfuscation. The search for the optimal obfuscation configuration has been done by Ceccato et al [34] in case of software diversity but using static metrics.…”
Section: Related Workmentioning
confidence: 99%
“…However, GAC fails to surpass the quality of the hierarchical clustering solution at higher K values. To the best of our knowledge, our study is the first to explore the viability of GA-based clustering solutions for mobile app categorisation, and, more in general, few studies have investigated search-based clustering in SE research (e.g., [5,6,11,15]). This study shows the viability of search-based clustering solutions for SE tasks, and we hope can open further avenues for SBSE research.…”
Section: Introductionmentioning
confidence: 99%
“…http://clapp.afnan.ws/data/ 4 Modified GAMA code can be found here: https://github.com/afnan-s/gama5 The cluster centre is the arithmetic mean of all the points belonging to the cluster.…”
mentioning
confidence: 99%