- Sponsor:
- sigsac
It is our great pleasure to welcome you to the 2021 workshop on research on offensive and defensive techniques in the context of Man At The End (MATE) attacks - CheckMate '21.
CheckMATE is the continuation, extension (and renaming) of a long history of workshops throughout the years. This year's symposium continues its tradition of being the premier forum for research in the context of man-at-the-end attacks, with a focus on models and techniques to defend software from tampering, reverse engineering, and piracy as well as to the development of new attack strategies that highlight the need of more complete defenses. CheckMate gives researchers and practitioners a unique opportunity to share their perspectives with others interested in this unique area of security.
We also encourage attendees to attend the tutorial on "Analyzing Virtualization-based Obfuscation Schemes" by Tim Bazytko.
Proceeding Downloads
Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations
Recent work suggests that it may be possible to determine the author of a binary program simply by analyzing stylistic features preserved within it. As this poses a threat to the privacy of programmers who wish to distribute their work anonymously, we ...
A Framework for Automatic Exploit Generation for JIT Compilers
This paper proposes a framework for automatic exploit generation in JIT compilers, focusing in particular on heap corruption vulnerabilities triggered by dynamic code, i.e., code generated at runtime by the JIT compiler. The purpose is to help assess ...
A DCA-resistant Implementation of SM4 for the White-box Context
SM4 [ISO.IEC.18033-3.AMD2] is a cryptographic standard issued by the Organization of State Commercial Administration of China as an authorized block cipher for the use within China. Based on threshold implementations and operations in composite fields, ...
LLWM & IR-Mark: Integrating Software Watermarks into an LLVM-based Framework
While software protection mechanisms, such as DRM and online services, hinder the unrestrained duplication of games and applications, these mechanisms fail at protecting individual software components from reuse by intellectual property thieves. While ...
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
- Davide Quarta,
- Michele Ianni,
- Aravind Machiry,
- Yanick Fratantonio,
- Eric Gustafson,
- Davide Balzarotti,
- Martina Lindorfer,
- Giovanni Vigna,
- Christopher Kruegel
Protecting the confidentiality of applications on commodity operating systems, both on desktop and mobile devices, is challenging: attackers have unrestricted control over an application's processes and thus direct access to any of the application's ...
PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical Expression
Algorithmic identification is the crux for several binary analysis applications, including malware analysis, vulnerability discovery, and embedded firmware reverse engineering. However, data-driven and signature-based approaches often break down when ...
- Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks
Recommendations
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityMATE (Man-At-The-End) is an attacker model where an adversary has access to the target software and/or hardware environment of his victim and the ability to observe and modify it in order to extract secrets such as cryptographic keys or sensitive ...