Advanced search
1 file | 2.40 MB Add to list
Author
Organization
Project
Abstract
Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.
Keywords
reverse engineering, strategy modeling, simulation, and capturing

Downloads

  • (...).pdf
    • full text (Published version)
    • |
    • UGent only
    • |
    • PDF
    • |
    • 2.40 MB

Citation

Please use this url to cite or link to this publication:

MLA
Faingnaert, Thomas, et al. “Tools and Models for Software Reverse Engineering Research.” PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024, Association for Computing Machinery (ACM), 2024, pp. 44–58, doi:10.1145/3689934.3690817.
APA
Faingnaert, T., Zhang, T., Van Iseghem, W., Everaert, G., Coppens, B., Collberg, C., & De Sutter, B. (2024). Tools and models for software reverse engineering research. PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024, 44–58. https://doi.org/10.1145/3689934.3690817
Chicago author-date
Faingnaert, Thomas, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, and Bjorn De Sutter. 2024. “Tools and Models for Software Reverse Engineering Research.” In PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024, 44–58. New York, NY, USA: Association for Computing Machinery (ACM). https://doi.org/10.1145/3689934.3690817.
Chicago author-date (all authors)
Faingnaert, Thomas, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, and Bjorn De Sutter. 2024. “Tools and Models for Software Reverse Engineering Research.” In PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024, 44–58. New York, NY, USA: Association for Computing Machinery (ACM). doi:10.1145/3689934.3690817.
Vancouver
1.
Faingnaert T, Zhang T, Van Iseghem W, Everaert G, Coppens B, Collberg C, et al. Tools and models for software reverse engineering research. In: PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024. New York, NY, USA: Association for Computing Machinery (ACM); 2024. p. 44–58.
IEEE
[1]
T. Faingnaert et al., “Tools and models for software reverse engineering research,” in PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024, Salt Lake City, UT, USA, 2024, pp. 44–58.
@inproceedings{01JJKJGX1S7S33J3JFHFHAED54,
  abstract     = {{Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.}},
  author       = {{Faingnaert, Thomas and Zhang, Tab and Van Iseghem, Willem and Everaert, Gertjan and Coppens, Bart and Collberg, Christian and De Sutter, Bjorn}},
  booktitle    = {{PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024}},
  isbn         = {{9798400712302}},
  keywords     = {{reverse engineering,strategy modeling, simulation, and capturing}},
  language     = {{eng}},
  location     = {{Salt Lake City, UT, USA}},
  pages        = {{44--58}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{Tools and models for software reverse engineering research}},
  url          = {{http://doi.org/10.1145/3689934.3690817}},
  year         = {{2024}},
}

Altmetric
View in Altmetric
Web of Science
Times cited: