<?xml version="1.0" encoding="UTF-8"?>

<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:admin="http://webns.net/mvcb/"
 xmlns:content="http://purl.org/rss/1.0/modules/content/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:syn="http://purl.org/rss/1.0/modules/syndication/"
 xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/"
>

<channel rdf:about="https://biblio.ugent.be/">
<title>Academic Bibliography</title>
<link>https://biblio.ugent.be/</link>
<description>Ghent University Academic Bibliography</description>
<syn:updateBase>2000-01-01T00:00+00:00</syn:updateBase>
<syn:updateFrequency>1</syn:updateFrequency>
<syn:updatePeriod>monthly</syn:updatePeriod>
<items>
 <rdf:Seq>
  <rdf:li rdf:resource="https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54" />
 </rdf:Seq>
</items>
</channel>
<item rdf:about="https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54">
<title>Tools and models for software reverse engineering research</title>
<link>https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54</link>
<dc:creator>Faingnaert, Thomas</dc:creator>
<dc:creator>Zhang, Tab</dc:creator>
<dc:creator>Van Iseghem, Willem</dc:creator>
<dc:creator>Everaert, Gertjan</dc:creator>
<dc:creator>Coppens, Bart</dc:creator>
<dc:creator>Collberg, Christian</dc:creator>
<dc:creator>De Sutter, Bjorn</dc:creator>
<dc:date>2024</dc:date>
<dc:description>Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.</dc:description>
<dc:format>application/pdf</dc:format>
<dc:identifier>https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54</dc:identifier>
<dc:identifier>http://hdl.handle.net/1854/LU-01JJKJGX1S7S33J3JFHFHAED54</dc:identifier>
<dc:identifier>http://doi.org/10.1145/3689934.3690817</dc:identifier>
<dc:identifier>https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54/file/01JJKJVD9XA2BNA4JZE1G970ND</dc:identifier>
<dc:identifier>https://biblio.ugent.be/publication/01JJKJGX1S7S33J3JFHFHAED54/file/01JJKJVD9XA2BNA4JZE1G970ND</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>Association for Computing Machinery (ACM)</dc:publisher>
<dc:rights>info:eu-repo/semantics/restrictedAccess</dc:rights>
<dc:source>PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024</dc:source>
<dc:source>ISBN: 9798400712302</dc:source>
<dc:subject>Technology and Engineering</dc:subject>
<dc:subject>reverse engineering</dc:subject>
<dc:subject>strategy modeling, simulation, and capturing</dc:subject>
<dc:title>Tools and models for software reverse engineering research</dc:title>
<dc:type>conference</dc:type>
<dc:type>info:eu-repo/semantics/conferenceObject</dc:type>
<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
</item>
</rdf:RDF>