Publications

Year 2007

Brecht Wyseur, Wil Michiels, Paul Gorissen and Bart Preneel, "Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings", SAC 2007 - Workshop on Selected Areas of Cryptography, Ottawa, Canada, August 16-17, 2007.


Dries Schellekens, Brecht Wyseur and Bart Preneel, "Remote Attestation on Legacy Operating Systems with Trusted Platform Modules," REM 2007 - International Workshop on Run Time Enforcement for Mobile and Distributed Systems, Dresden, Germany, September 27, 2007.


Mariano Ceccato, Mila Preda, Jasvir Nagra, Christian Collberg and Paolo Tonella, "Barrier Slicing for Remote Software Trusting", SCAM 2007 - IEEE International Working Conference on Source Code Analysis and Manipulation, Paris, France.
In Proceedings of the Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007). pp.27-36, Sept. 30 2007-Oct. 1 2007. IEEE Computer Society, Washington, DC.


Christian Collberg, Jasvir Nagra and Fei-Yue Wang, "Surreptitious Software: Models from Biology and History," MMM-ACNS 2007 - International Conference Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, September 13-15, 2007.


Jean-Daniel Aussel, "Smart Cards and Digital Security," MMM-ACNS 2007 - International Conference Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, September 13-15, 2007.


Vasiliy Desnitsky, Igor Kotenko, "Models of Remote Authentication for Software Protection", Proceedings of International Conferences AIS'07 - Intelligent systems and CAD-2007 - Intelligent CAD, pag 43-50, Moscow, Fizmatlit, 2007.
In Russian.



Year 2008

Jasvir Nagra, Mariano Ceccato and Paolo Tonella, "Distributing Trust Verification to Increase Application Performance," PDP2008 - Euromicro Conference on Parallel, Distributed and Network-based, Toulouse, France, February 2008.
In D. E. Baz, J. Bourgeois and F. Spies editors, Proc. of the 16th Euromicro Conference on Parallel, Distributed and Network-based Processing 2008, pages 604-610. IEEE Computer Society.


Riccardo Scandariato, Yoram Ofek, Paolo Falcarin and Mario Baldi, "Application-oriented trust in distributed computing". ARES 2008 - International Conference on Availability, Reliability and Security, Barcelona (Spain), March 2008.


Mariano Ceccato, Yoram Ofek and Paolo Tonella, "Remote entrusting by run- time software authentication", SOFSEM 2008 - Conference on Current Trends in Theory and Practice of Computer Science,Tatras, Slovakia, January, 2008.
In V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors, Proceedings of the 34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2008), vol. 4910 of Lecture Notes in Computer Science, pages 83-97, Springer, 2008.


Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella, "Towards Experimental Evaluation of Code Obfuscation Techniques", QoP2008 - 4th Workshop on Quality of Protection, colocated with CCS2008 - 15th ACM Conference on Computer and Communications Security.
Draft


Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian Collberg, Paolo Tonella, "Trading-off Security and Performance in Barrier Slicing for Remote Software Entrusting", JASE - Journal of Automated Software Engineering, Springler, Netherlands.
Draft


A. Ali, Jean-Daniel Aussel, L. Castillo, Jerome D'Annoville, S. Durand, K. Lu, "Smart Cards and remote entrusting", Future of Trust in Computing, 2nd conference - Berlin, Germany, June 30 - July 02, 2008.
Draft


Vasiliy Desnitsky, Igor Kotenko, "Model of software protection based on remote entrusting mechanism", V Inter-regional Conference Information Security of Russia Regions, Selected papers proceedings, St.Petersburg, 2008.
In Russian.


Igor Kotenko, Vasiliy Desnitsky, "Aspect-oriented approach to mobile module realization in security model based on remote entrusting mechanism", Information Technologies and Computing Systems, 2008.
In Russian.


Vasiliy Desnitsky, Igor Kotenko, "Software protection based on remote entrusting mechanism", News of High schools, Instrument making, Vol.51, No.11, ISSN 0021-3454, 2008.
In Russian.


Vasiliy Desnitsky, Igor Kotenko, Sergey Reznik, "Development and verification of message exchange protocol for protection of programs based on remote entrusting mechanism", Information Security - Inside, No.4-5, 2008.
In Russian.


Vasiliy Desnitsky, Igor Kotenko, Sergey Reznik, "Development and analysis of message exchange protocol for remote entrusting mechanism", Proceedings of International Conferences AIS'08 - Intelligent systems and CAD-2008 - Intelligent CAD, Moscow, Fizmatlit, 2008.
In Russian.


Amir Herzberg, Haya Shulman, "Robust Combiners for White-Box Secutity"
To be submitted


Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo, "Towards a Theory of White-Box Security"
To be submitted


J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. De Bosschere, "Towards Tamper Resistant Code Encryption: Practice and Experience", In Information Security Practice and Experience Conference LNCS 4991, L. Chen, Y. Mu, and W. Susilo (eds.), pp. 86-100, 2008


D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules", 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007), Electronic Notes in Theoretical Computer Science197(1), F. Massacci , and F. Piessens (eds.), Elsevier, pp. 59-72, 2008.


D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules", Submitted for printing in Special Issue on Science of Computer Programming, 2008.



Year 2009



A. Saxena, B. Wyseur, and B. Preneel, "White-Box Cryptography: Formal Notions and (Im)possibility Results", Submitted to 22nd IEEE Computer Security Foundations Symposium (CSF 2009)


Mariano Ceccato, Mila Dalla Preda, Anirban Majumdar, Paolo Tonella, "Remote software protection by orthogonal client replacement", In Proceedings of the 24th ACM Symposium on Applied Computing, ACM, March 2009


Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano and Paolo Tonella, "The Effectiveness of Source Code Obfuscation: an Experimental Assessment", In Proceedings of IEEE International Conference on Program Comprehension, IEEE May 2009.


Vasiliy Desnitsky, Igor Kotenko, "Analysis and Design of Entrusting Protocol for Distributed Software Protection", Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009), Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9
Extended abstract.


Vasily Desnitsky, Igor Kotenko, "Design of Entrusting Protocols for Software Protection", Fourth International Workshop Information Fusion and Geographical Information Systems (IF&GIS’09), St.Petersburg, Russia, May 17-20, 2009.
Lecture Notes in Geoinformation and Cartography. Springer. 2009.


Sergey Reznik, Igor Kotenko, "Analysis of methods and tools of security protocol verification for their combined usage", Information Security - Inside, No.3, 2009.


Vasily Desnitsky, Igor Kotenko, "An Approach for Software Protection based on Remote Entrusting", 11th Conference "RusCrypto" on Cryptology, Steganography, Digital Signature and Security Systems Zvenigorod, Russia. April 2-5, 2009.
Extended abstract


Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano and Paolo Tonella, "The Effectiveness of Source Code Obfuscation: an Experimental Assessment", In Proceedings of the 17th IEEE International Conference on Program Comprehension (ICPC 2009), Vancouver, Canada, 17-19 May 2009. IEEE pp. 178-187.


Mariano Ceccato, Paolo Tonella, Mila Dalla Preda and Anirban Majumdar, "Remote software protection by orthogonal client replacement", In D. Shin, editor, Proceedings of the 24th ACM Symposium on Applied Computing (SAC 2009), pages 448