Skip to main content

Showing 1–4 of 4 results for author: Regano, L

.
  1. arXiv:2303.15033  [pdf, other

    cs.SE cs.CR

    Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection

    Authors: Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens

    Abstract: The last years have seen an increase in Man-at-the-End (MATE) attacks against software applications, both in number and severity. However, software protection, which aims at mitigating MATE attacks, is dominated by fuzzy concepts and security-through-obscurity. This paper presents a rationale for adopting and standardizing the protection of software as a risk management process according to the NI… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    Comments: Preprint submitted to Computers & Security. arXiv admin note: substantial text overlap with arXiv:2011.07269

  2. arXiv:2011.07269  [pdf, other

    cs.SE cs.CR

    Man-at-the-End Software Protection as a Risk Analysis Process

    Authors: Daniele Canavese, Leonardo Regano, Cataldo Basile, Bart Coppens, Bjorn De Sutter

    Abstract: The last years have seen an increase of Man-at-the-End (MATE) attacks against software applications, both in number and severity. However, MATE software protections are dominated by fuzzy concepts and techniques, with security-through-obscurity omnipresent in the field. This paper presents a rationale for adopting and standardizing the protection of software as a risk management process according… ▽ More

    Submitted 1 March, 2022; v1 submitted 14 November, 2020; originally announced November 2020.

  3. Assessment of Source Code Obfuscation Techniques

    Authors: Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella

    Abstract: Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscation techniques are divided in code and data obfuscation, depending on the protected asset. While preliminary empirical studies have been conducted to determine the impact of code obfusc… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Post-print, SCAM 2016

  4. arXiv:1703.07757  [pdf, ps, other

    cs.CY

    Ethical issues of ISPs in the modern web

    Authors: Leonardo Regano, Ali Safari Khatouni, Martino Trevisan, Alessio Viticchie

    Abstract: In recent years, ethical issues in the networking field are getting moreimportant. In particular, there is a consistent debate about how Internet Service Providers (ISPs) should collect and treat network measurements. This kind of information, such as flow records, carry interesting knowledge from multiple points of view: research, traffic engineering and e-commerce can benefit from measurements r… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

    Comments: 9 pages, 3 figures