May 2, 2024, 4:11 a.m. | Bjorn De Sutter, Sebastian Schrittwieser, Bart Coppens, Patrick Kochberger

cs.CR updates on arXiv.org arxiv.org

arXiv:2307.07300v2 Announce Type: replace
Abstract: Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains difficult to measure the strength of protections because MATE attackers can reach their …

arms arxiv assets attackers attacks authors companies confidentiality control cs.cr defenders embedded end evaluation integrity malware methodologies prevent protection race research software system try

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Product Delivery Associate - Cybersecurity | CyberOps

@ JPMorgan Chase & Co. | NY, United States

Security Ops Infrastructure Engineer (Remote US):

@ RingCentral | Remote, USA

SOC Analyst-1

@ NTT DATA | Bengaluru, India