University of Arizona

Claire Taylor is a PhD student at the Department of Computer Science at the University of Arizona. For her PhD dissertation research she studies how reverse engineers attack heavily obfuscated and tamper-proofed programs. The goal is to better understand the reverse engineering techniques used in practice and what constitutes effective software protection techniques. Christian Collberg is the author of Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection.

University of Arizona

RevEngE (The Reverse Engineering Competition Engine) was built by Claire Taylor for her PhD dissertation research. RevEngE collects traces of actions as reverse engineers attack protected software, and visualizes these traces. The Tigress code obfuscator was built by Christian Collberg and contains multiple obfuscation and tamper-proofing code transformations.





Ghent University

Bjorn de Sutter is associate professor in the Computer Systems Lab. Bart Coppens and Bert Abrath are postdoctoral researchers in the lab working on software and system protection, Jens Van den Broeck is a PhD student working on more resilient and stealthier deployment of man-at-the-end software protections. 

Ghent University

In the ASPIRE project, the team contributed to the ASPIRE Compilation Tool Chain and framework to deploy a range of software protections (https://github.com/aspire-fp7/framework). The link-time rewriter Diablo (https://github.com/csl-ugent/diablo), which was developed in the team over almost two decades, is a major component of that tool chain.

Cloakware/Irdeto


Catherine Chambers is a Senior Product Manager at Irdeto. She holds an MSc in Mathematics from Queen's University. Phil Eisen is a Senior Product Owner. In 2002, he co-authored the original papers on the topic of whitebox cryptography. He holds a M.Math (Cryptography) from the University of Waterloo.

Cloakware/Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries. We are proud to contribute to the Grand Reverse Engineering Challenge and do our part to advance the state of the art in security analysis, which will ultimately result in stronger solutions.