Claire Taylor is a PhD student at the Department of Computer Science at the University of Arizona. For her PhD dissertation research she studies how reverse engineers attack heavily obfuscated and tamper-proofed programs. The goal is to better understand the reverse engineering techniques used in practice and what constitutes effective software protection techniques. Christian Collberg is the author of Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection.
RevEngE (The Reverse Engineering Competition Engine) was built by Claire Taylor for her PhD dissertation research. RevEngE collects traces of actions as reverse engineers attack protected software, and visualizes these traces. The Tigress code obfuscator was built by Christian Collberg and contains multiple obfuscation and tamper-proofing code transformations.
Bjorn de Sutter is associate professor in the Computer Systems Lab. Bart Coppens and Bert Abrath are postdoctoral researchers in the lab working on software and system protection, Jens Van den Broeck is a PhD student working on more resilient and stealthier deployment of man-at-the-end software protections.
In the ASPIRE project, the team contributed to the ASPIRE Compilation Tool Chain and framework to deploy a range of software protections (https://github.com/aspire-fp7/framework). The link-time rewriter Diablo (https://github.com/csl-ugent/diablo), which was developed in the team over almost two decades, is a major component of that tool chain.
Catherine Chambers is a Senior Product Manager at Irdeto. She holds an MSc in Mathematics from Queen's University. Phil Eisen is a Senior Product Owner. In 2002, he co-authored the original papers on the topic of whitebox cryptography. He holds a M.Math (Cryptography) from the University of Waterloo.