skip to main content
10.1145/3465413acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
Checkmate '21: Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security Virtual Event Republic of Korea 19 November 2021
ISBN:
978-1-4503-8552-7
Published:
15 November 2021
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2021 workshop on research on offensive and defensive techniques in the context of Man At The End (MATE) attacks - CheckMate '21.

CheckMATE is the continuation, extension (and renaming) of a long history of workshops throughout the years. This year's symposium continues its tradition of being the premier forum for research in the context of man-at-the-end attacks, with a focus on models and techniques to defend software from tampering, reverse engineering, and piracy as well as to the development of new attack strategies that highlight the need of more complete defenses. CheckMate gives researchers and practitioners a unique opportunity to share their perspectives with others interested in this unique area of security.

We also encourage attendees to attend the tutorial on "Analyzing Virtualization-based Obfuscation Schemes" by Tim Bazytko.

Skip Table Of Content Section
SESSION: Workshop Presentations
research-article
Open Access
Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations

Recent work suggests that it may be possible to determine the author of a binary program simply by analyzing stylistic features preserved within it. As this poses a threat to the privacy of programmers who wish to distribute their work anonymously, we ...

research-article
Open Access
A Framework for Automatic Exploit Generation for JIT Compilers

This paper proposes a framework for automatic exploit generation in JIT compilers, focusing in particular on heap corruption vulnerabilities triggered by dynamic code, i.e., code generated at runtime by the JIT compiler. The purpose is to help assess ...

research-article
A DCA-resistant Implementation of SM4 for the White-box Context

SM4 [ISO.IEC.18033-3.AMD2] is a cryptographic standard issued by the Organization of State Commercial Administration of China as an authorized block cipher for the use within China. Based on threshold implementations and operations in composite fields, ...

short-paper
LLWM & IR-Mark: Integrating Software Watermarks into an LLVM-based Framework

While software protection mechanisms, such as DRM and online services, hinder the unrestrained duplication of games and applications, these mechanisms fail at protecting individual software components from reuse by intellectual property thieves. While ...

research-article
Public Access
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone

Protecting the confidentiality of applications on commodity operating systems, both on desktop and mobile devices, is challenging: attackers have unrestricted control over an application's processes and thus direct access to any of the application's ...

research-article
Open Access
PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical Expression

Algorithmic identification is the crux for several binary analysis applications, including malware analysis, vulnerability discovery, and embedded firmware reverse engineering. However, data-driven and signature-based approaches often break down when ...

Contributors
  • University of Southern California
  • Technical University of Munich
  1. Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks

    Recommendations