Reverse engineering software is commonly done and has various goals such as finding vulnerabilities, learning about security mechanisms and countermeasures, and for general understanding and information extraction. Obviously all software will be reverse engineered at some point but you will never really find out. This talk is about detecting if your software is being reverse engineered. Software is complex and reverse engineering is hard. People will “cheat” and search the web for clues about your software. The idea behind this research is that this “cheating” can be detected. The idea is to embed canaries into binaries and application data to help detecting “reverse engineering” at the time when somebody searches the web for your tokens. In the talk we will discuss different ideas around this general idea and how this can be implemented. Finally we show how this can be used to detect different level of adversaries.Back to Open CFP
We are pleased to announce the Call For Papers for INFILTRATE 2018 is now open. If you would like to present and have an offense-focused-fresh-content presentation, please submit an abstract, Bio and headshot to firstname.lastname@example.org. This information will be included on our Open CFP site, here, where the public can vote on which presentations they are most interested in seeing at INFILTRATE. Call for papers will close on December 14th, 2017. Shortly after this date, the winning speakers will be notified.
Some of the benefits of speaking at INFILTRATE are: