Contributing to Tigress
We welcome contributors who want to extend Tigress with new transformations. Send us email if you desire source code access. Keep in mind that you will have to be fluent in OCaml and CIL.
Acknowledgments
- This project was partially supported by the NSF under grant 1145913, EAGER: Man-at-the-End Attacks: Defenses and Evaluation Techniques.
- This project was partially supported by the NSF under grant 1525820, Understanding Anti-Analysis Defenses in Malicious Code
Contributors
- Christian Collberg
- Sam Martin
- Jonathan Myers
- Bill Zimmerman
- Petr Krajča extended the MyJit library to support Tigress.
- Gabriel Kerneis extended the CIL library to support Tigress.
- Saumya Debray and Babak Yadegari suggested the --FlattenConditionalKinds=flag encoding of conditionals.
Cite us
@inproceedings{Banescu17predicting, author = {Sebastian Banescu and Christian S. Collberg and Alexander Pretschner}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017.}, pages = {661--678}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/banescu}, timestamp = {Fri, 01 Sep 2017 12:29:11 +0200}, biburl = {https://dblp.org/rec/bib/conf/uss/BanescuCP17}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{Stephens18probabilistic, author = {Jon Stephens and Babak Yadegari and Christian S. Collberg and Saumya Debray and Carlos Scheidegger}, title = {Probabilistic Obfuscation Through Covert Channels}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {243--257}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00025}, doi = {10.1109/EuroSP.2018.00025}, timestamp = {Wed, 11 Jul 2018 11:44:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurosp/StephensYCDS18}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{Banescu16code, author = {Sebastian Banescu and Christian S. Collberg and Vijay Ganesh and Zack Newsham and Alexander Pretschner}, title = {Code obfuscation against symbolic execution attacks}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {189--200}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991114}, } @inproceedings{Collberg2012Distributed, author = {Christian Collberg and Sam Martin and Jonathan Myers and Jasvir Nagra}, title = {Distributed Application Tamper Detection via Continuous Software Updates}, booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference}, series = {ACSAC '12}, year = {2012}, isbn = {978-1-4503-1312-4}, location = {Orlando, Florida}, pages = {319--328}, url = {http://doi.acm.org/10.1145/2420950.2420997}, doi = {10.1145/2420950.2420997}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{Kanzaki2015Metric, title ="Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model", author = "Yuichiro Kanzaki and Akito Monden and Christian Collberg", booktitle = "SPRO 2015 : International Workshop on Software Protection", year = 2015 }