Contributing to Tigress

We welcome contributors who want to extend Tigress with new transformations. Send us email if you desire source code access. Keep in mind that you will have to be fluent in OCaml and CIL.

 

Acknowledgments

 

Contributors

 

Cite us

@inproceedings{Banescu17predicting,
  author    = {Sebastian Banescu and
               Christian S. Collberg and
               Alexander Pretschner},
  editor    = {Engin Kirda and
               Thomas Ristenpart},
  title     = {Predicting the Resilience of Obfuscated Code Against Symbolic Execution
               Attacks via Machine Learning},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {661--678},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/banescu},
  timestamp = {Fri, 01 Sep 2017 12:29:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/BanescuCP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{Stephens18probabilistic,
  author    = {Jon Stephens and
               Babak Yadegari and
               Christian S. Collberg and
               Saumya Debray and
               Carlos Scheidegger},
  title     = {Probabilistic Obfuscation Through Covert Channels},
  booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  pages     = {243--257},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/EuroSP.2018.00025},
  doi       = {10.1109/EuroSP.2018.00025},
  timestamp = {Wed, 11 Jul 2018 11:44:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/StephensYCDS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{Banescu16code,
  author    = {Sebastian Banescu and
               Christian S. Collberg and
               Vijay Ganesh and
               Zack Newsham and
               Alexander Pretschner},
  title     = {Code obfuscation against symbolic execution attacks},
  booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
               {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages     = {189--200},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2991114},
}

@inproceedings{Collberg2012Distributed,
   author = {Christian Collberg and Sam Martin and Jonathan Myers and Jasvir Nagra},
   title = {Distributed Application Tamper Detection via Continuous Software Updates},
   booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference},
   series = {ACSAC '12},
   year = {2012},
   isbn = {978-1-4503-1312-4},
   location = {Orlando, Florida},
   pages = {319--328},
   url = {http://doi.acm.org/10.1145/2420950.2420997},
   doi = {10.1145/2420950.2420997},
   publisher = {ACM},
   address = {New York, NY, USA},
} 

@inproceedings{Kanzaki2015Metric,
   title ="Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model",
   author = "Yuichiro Kanzaki and Akito Monden and Christian Collberg",
   booktitle = "SPRO 2015 : International Workshop on Software Protection",
   year = 2015
}