Evaluation Methodologies in Software Protection Research

07/14/2023
by   Patrick Kochberger, et al.
0

Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains difficult to measure the strength of protections because MATE attackers can reach their goals in many different ways and a universally accepted evaluation methodology does not exist. This survey systematically reviews the evaluation methodologies of papers on obfuscation, a major class of protections against MATE attacks. For 572 papers, we collected 113 aspects of their evaluation methodologies, ranging from sample set types and sizes, over sample treatment, to performed measurements. We provide detailed insights into how the academic state of the art evaluates both the protections and analyses thereon. In summary, there is a clear need for better evaluation methodologies. We identify nine challenges for software protection evaluations, which represent threats to the validity, reproducibility, and interpretation of research results in the context of MATE attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/07/2021

Comparative Review of Malware Analysis Methodologies

To fight against the evolution of malware and its development, the speci...
research
07/11/2019

Supply chain malware targets SGX: Take care of what you sign

Malware attacks represent a significant part of today's security threats...
research
04/17/2022

How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools

With the advent of open source software, a veritable treasure trove of p...
research
09/12/2019

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

Reactive defense mechanisms, such as intrusion detection systems, have m...
research
07/02/2021

A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature

Computing Education Research (CER) is critical for supporting the increa...
research
08/12/2022

A Gentle Introduction and Survey on Computing with Words (CWW) Methodologies

Human beings have an inherent capability to use linguistic information (...
research
07/02/2019

Report on the Obfuscated Integration of Software Protections

To counter man-at-the-end attacks such as reverse engineering and tamper...

Please sign up or login with your details

Forgot password? Click here to reset