April 5, 2023, 1:10 a.m. | Giulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro

cs.CR updates on arXiv.org arxiv.org

Software obfuscation plays a crucial role in protecting intellectual property
in software from reverse engineering attempts. While some obfuscation
techniques originate from the obfuscation-reverse engineering arms race, others
stem from different research areas, such as binary software exploitation.
Return-oriented programming (ROP) gained popularity as one of the most
effective exploitation techniques for memory error vulnerabilities. ROP
interferes with our natural perception of a process control flow, inspiring us
to repurpose ROP as a robust and effective form of software obfuscation. …

arms binary control engineering error exploitation flow intellectual property memory obfuscation process process control programming protecting research return reverse reverse engineering role rop software stem techniques vulnerabilities work

Security Operations Program Manager

@ Microsoft | Redmond, Washington, United States

Sr. Network Security engineer

@ NXP Semiconductors | Bengaluru (Nagavara)

DevSecOps Engineer

@ RP Pro Services | Washington, District of Columbia, United States

Consultant RSSI H/F

@ Hifield | Sèvres, France

TW Senior Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Cyber Security, Senior Manager

@ Triton AI Pte Ltd | Singapore, Singapore, Singapore