![]() |
|
| SPRO'17 Table of Contents SPRO'16
Workshop Chairs' Welcome Keynote Address Intel
Software Guard Extensions - Introduction and Open Research Challenges (Page
1)
Research Paper Session 1: Vulnerabilities Beyond
the Attack Surface: Assessing Security Risk with Random Walks on Call
Graphs (Page 3) ROP
Gadget Prevalence and Survival under Compiler-based Binary Diversification
Schemes (Page 15) |
|
| (Return to Top) |
Research Paper Session 2: Obfuscation Defeating
MBA-based Obfuscation (Page
27) VOT4CS:
A Virtualization Obfuscation Tool for C# (Page
39) Binary
Permutation Polynomial Inversion and Application to Obfuscation Techniques (Page
51) |
| (Return to Top) |
Research Paper Session 3: White-box Crypto & Integrity StIns4CS:
A State Inspection Tool for C# (Page
61) Reactive
Attestation: Automatic Detection and Reaction to Software Tampering
Attacks (Page 73) Attacking
White-Box AES Constructions (Page
85) |
| (Return to Top) | Tutorial The
ASPIRE Framework for Software Protection (Page
91) |