• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Birgit Mitter
      • Oliver Spadiut
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • Alternative Methods to Animal Testing
        • European Partnership BE READY
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • LUKE – Ukraine
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Korea
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol-South Tyrol-Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

Evaluation Models for the Resilience and Stealth of Software Protections and Malware

Evaluation Models for the Resilience and Stealth of Software Protections and Malware

Sebastian Schrittwieser (ORCID: 0000-0003-2115-2022)
  • Grant DOI 10.55776/I3646
  • Funding program Principal Investigator Projects International
  • Status ended
  • Start July 1, 2018
  • End February 28, 2023
  • Funding amount € 234,570
  • Project website

Bilaterale Ausschreibung: Belgien

Disciplines

Computer Sciences (100%)

Keywords

    Code Obfuscation, Resilience, Stealth, Software Protection, Malware, Code Analysis

Abstract Final report

The project EMRESS (Evaluation Models for the Resilience and Stealth of Software Protections and Malware) deals with the problem of quantification of software protection techniques which are used both in commercial programs as well as malicious software (malware). Despite the fact that software protection techniques have been researched and used in practice since over two decades, no models for the strength of different protections exist. The lack of models is highly problematic for software vendors, because it prevents automated decision support for the optimal protection strategy for their software, as well as for malware analysts as no automated support for selecting the optimal malware analysis techniques given an incoming sample that needs to be analysed exists. With this project, we aim to improve this situation dramatically by developing quantitative models and analysis techniques for the strength of software protections based on the two properties resilience (strength of a protection against different analysis techniques) and stealth. The quantification of resilience will be achieved through novel models and metrics to predict which software representations attackers and their tools obtain after they used tools, heuristics, and assumptions to circumvent, to undo, or to neglect deployed protections. Stealth of software will be made quantifiable by developing novel techniques to identify and match components with (to some extent) known semantics in larger software packages. In both research areas comprehensive literature surveys will build the foundation of our research which describes the scientific knowledge of the arms race between software protection and code analysis in theory. Based on the results from the surveys, we derive properties of program code which can be used for (a) the quantification of the strength of applied protections and (b) in the context of malware the identification of its type. The results from this research will be used as the foundation for model generation. Next, prototype implementations of software protections and analysis concepts will be used in controlled experiments in order to verify our hypothesis in the model generation process. We will study how professional software penetration testers and malware analysts deal with different types of protections and compare the results with our survey works. The results of the project EMRESS will improve the scientific state-of-the-art in quantification of software protection techniques with respect to theory but also practice. Both companies wanting to protect benign software through obfuscation and other protections, as well as malware analysts will be able to use our results for selecting the best available technologies for their use cases. Additionally, we expect positive effects in the research field of software testing and software assurance.

The EMRESS project dealt with the quantification of software protection techniques, which are used in commercial programs as well as in malware. Although these techniques have been researched for a long time and are widely used in practice, until now no robust models for the strength of different protections existed. The lack of such models was highly problematic for malware analysts, who must determine a suitable analysis strategy depending on the protection techniques used by the malware. The project explored methodologies for determining the strength of the two key properties of a protection technique, stealth (covertness of the protection) and resilience (strength of the protection against automated undoing). To this end, we have created two comprehensive software frameworks that allow us to conduct empirical research on software protection and program analysis, and subsequently to derive predictive models for the strength of software protection techniques. To model stealth properties, we extracted patterns from a set of code complexity metrics and measured how uniquely they can be assigned to specific protection techniques. The existence of unique patterns reduces the stealth of a protection technique since it can be identified by the pattern. To quantify resilience properties, we determined the quality of reconstructions of basic program structures by a variety of analysis programs in the context of individual software protection techniques or the combination of techniques. The worse structures such as the control flow graph of a program can be reconstructed, the higher the resilience can be valued. Another research focus of the project was the identification of functionality in protected programs. We developed a novel methodology that uniquely identifies functionality based on its characteristic input-output behavior, independent of the exact implementation and the presence of obfuscation techniques. Combined, our frameworks serve as a decision support system for malware analysts by automatically identifying the protection techniques contained in potential malware, suggesting suitable analysis methods and tools, and automatically detecting the presence of typical malware functionality. Complementing the empirical research, the scientific state-of-the-art as well as methodological weaknesses in the research area of software protection were identified on the basis of more than 570 publications, and strategies to improve the status-quo were integrated in our frameworks. The results of the EMRESS project contribute significantly to the advancement of the scientific state-of-the-art in the field of software protection research, both in theory and in practice. Furthermore, we see positive effects for further research fields such as software testing and software assurance.

Research institution(s)
  • Universität Wien - 100%
International project participants
  • Bjorn Sutter, Ghent University - Belgium

Research Output

  • 8 Citations
  • 9 Publications
  • 1 Datasets & models
  • 6 Scientific Awards
  • 2 Fundings
Publications
  • 2025
    Title Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
    DOI 10.3390/make7040125
    Type Journal Article
    Author Felbauer P
    Journal Machine Learning and Knowledge Extraction
  • 2024
    Title Modeling Obfuscation Stealth Through Code Complexity; In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II
    DOI 10.1007/978-3-031-54129-2_23
    Type Book Chapter
    Publisher Springer Nature Switzerland
  • 2024
    Title Evaluation Methodologies in Software Protection Research
    DOI 10.1145/3702314
    Type Journal Article
    Author De Sutter B
    Journal ACM Computing Surveys
  • 2024
    Title Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns
    DOI 10.1016/j.jisa.2024.103850
    Type Journal Article
    Author Raubitzek S
    Journal Journal of Information Security and Applications
  • 2020
    Title Compiling and Analyzing Open Source Malware for Research Purposes
    DOI 10.1109/icssa51305.2020.00013
    Type Conference Proceeding Abstract
    Author Judt D
    Pages 32-37
  • 2023
    Title Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code
    DOI 10.5220/0012167000003555
    Type Conference Proceeding Abstract
    Author Gramberger M
    Pages 7-19
  • 2022
    Title Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
    DOI 10.1007/978-3-031-22295-5_15
    Type Book Chapter
    Author Schrittwieser S
    Publisher Springer Nature
    Pages 273-291
  • 2022
    Title Meta-framework for Automating Static Malware Analysis
    Type Journal Article
    Author Kochberger P
    Journal ERCIM News 129
    Pages 28-29
    Link Publication
  • 2021
    Title SoK: Automatic Deobfuscation of Virtualization-protected Applications
    DOI 10.1145/3465481.3465772
    Type Conference Proceeding Abstract
    Author Kochberger P
    Pages 1-15
Datasets & models
  • 2024 Link
    Title Layered Software Protection Dataset
    Type Database/Collection of data
    Public Access
    Link Link
Scientific Awards
  • 2025
    Title Visiting staff (Prof. Francesco Mercaldo)
    Type Attracted visiting staff or user to your research group
    Level of Recognition Continental/International
  • 2007
    Title ACM von checkmate
    Type Appointed as the editor/advisor to a journal or book series
    Level of Recognition National (any country)
  • 2024
    Title ERCIM News
    Type Appointed as the editor/advisor to a journal or book series
    Level of Recognition Continental/International
  • 2023
    Title Guest Editor Computer & Security
    Type Appointed as the editor/advisor to a journal or book series
    DOI 10.1016/j.cose.2023.103662
    Level of Recognition Continental/International
  • 2023
    Title Guest Editor Computer & Security
    Type Appointed as the editor/advisor to a journal or book series
    Level of Recognition Continental/International
  • 2021
    Title Keynote at ICSSA 2021
    Type Personally asked as a key note speaker to a conference
    Level of Recognition Continental/International
Fundings
  • 2020
    Title Inference of Optimal Cyber Defense Strategies
    Type Other
    Start of Funding 2020
    Funder Austrian Science Fund (FWF)
  • 2024
    Title Christian Doppler Laboratory AsTra
    Type Research grant (including intramural programme)
    Start of Funding 2024
    Funder Christian Doppler Research Association

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF