Contributing to Tigress
We welcome contributors who want to extend Tigress with new transformations. Send us email if you desire source code access. Keep in mind that you will have to be fluent in OCaml and CIL.
Acknowledgments
- This project was partially supported by the NSF under grant 1145913, EAGER: Man-at-the-End Attacks: Defenses and Evaluation Techniques.
- This project was partially supported by the NSF under grant 1525820, Understanding Anti-Analysis Defenses in Malicious Code
Contributors
- Christian Collberg
- Sam Martin
- Jonathan Myers
- Bill Zimmerman
- Petr Krajča extended the MyJit library to support Tigress.
- Gabriel Kerneis extended the CIL library to support Tigress.
- Saumya Debray and Babak Yadegari suggested the --FlattenConditionalKinds=flag encoding of conditionals.
Cite us
@inproceedings{Banescu17predicting,
author = {Sebastian Banescu and
Christian S. Collberg and
Alexander Pretschner},
editor = {Engin Kirda and
Thomas Ristenpart},
title = {Predicting the Resilience of Obfuscated Code Against Symbolic Execution
Attacks via Machine Learning},
booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
BC, Canada, August 16-18, 2017.},
pages = {661--678},
publisher = {{USENIX} Association},
year = {2017},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/banescu},
timestamp = {Fri, 01 Sep 2017 12:29:11 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/BanescuCP17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{Stephens18probabilistic,
author = {Jon Stephens and
Babak Yadegari and
Christian S. Collberg and
Saumya Debray and
Carlos Scheidegger},
title = {Probabilistic Obfuscation Through Covert Channels},
booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2018, London, United Kingdom, April 24-26, 2018},
pages = {243--257},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/EuroSP.2018.00025},
doi = {10.1109/EuroSP.2018.00025},
timestamp = {Wed, 11 Jul 2018 11:44:38 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurosp/StephensYCDS18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{Banescu16code,
author = {Sebastian Banescu and
Christian S. Collberg and
Vijay Ganesh and
Zack Newsham and
Alexander Pretschner},
title = {Code obfuscation against symbolic execution attacks},
booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
{ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
pages = {189--200},
year = {2016},
url = {http://dl.acm.org/citation.cfm?id=2991114},
}
@inproceedings{Collberg2012Distributed,
author = {Christian Collberg and Sam Martin and Jonathan Myers and Jasvir Nagra},
title = {Distributed Application Tamper Detection via Continuous Software Updates},
booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference},
series = {ACSAC '12},
year = {2012},
isbn = {978-1-4503-1312-4},
location = {Orlando, Florida},
pages = {319--328},
url = {http://doi.acm.org/10.1145/2420950.2420997},
doi = {10.1145/2420950.2420997},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{Kanzaki2015Metric,
title ="Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model",
author = "Yuichiro Kanzaki and Akito Monden and Christian Collberg",
booktitle = "SPRO 2015 : International Workshop on Software Protection",
year = 2015
}