Nessim Kisserli

Learn More
Self-modifying code is frequently used as an additional layer of complexity when obfuscating code. Although it does not provide a provable level of obfuscation, it is generally assumed to make attacks more expensive. This paper attempts to quantify the cost of attacking self-modified code by defining a taxonomy for it and systematically categorising an(More)
Security threats such as viruses, worms, trojans and spyware affects the security and authentication of software codes, forcing software developers to build security schemes for better software protection. These software threats exploit the authenticated data of the software and confidentiality, integrity and accessibility is greatly affected by these(More)
This thesis is discussing about software security through targeted diversification. It is a continuation of the previous year thesis by Merckx [20]. The first part of this thesis is focused on defending software with the use of targeted diversification. For that we implement a genetic computing algorithm that generates code snippets. This implementation is(More)
One-way functions are a fundamental notion in cryptography, since they are the necessary condition for the existence of secure encryption schemes. Most examples of such functions, including factoring, discrete Logarithm or the RSA function, can be, however, inverted with the help of a quantum computer. Hence, it is very important to study the possibility of(More)
Software protection and security plays a vital role to the business and commercial organizations. Various techniques has been proposed to enhance the security of the client's system to authenticate the software against piracy protection. Various software attacks like hardware cloning, software cloning ,software cracking, virus scripts provides high(More)
  • 1