Understanding and protecting closed-source systems through dynamic analysis
In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constrain...
Main Author: | Dolan-Gavitt, Brendan |
---|---|
Other Authors: | Lee, Wenke |
Format: | Others |
Language: | en_US |
Published: |
Georgia Institute of Technology
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/53012 |
Similar Items
-
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
by: Wei Wang, et al.
Published: (2019-01-01) -
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
by: Asma'a Mahfoud Hezam Al-Hakimi, et al.
Published: (2020-01-01) -
BadNets: Evaluating Backdooring Attacks on Deep Neural Networks
by: Tianyu Gu, et al.
Published: (2019-01-01) -
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
by: Florian Stolz, et al.
Published: (2021-08-01) -
Dismantling the AUT64 Automotive Cipher
by: Christopher Hicks, et al.
Published: (2018-05-01)