Model of Execution Trace Obfuscation Between Threads

被引:3
|
作者
Sha, Zihan [1 ]
Shu, Hui [1 ]
Xiong, Xiaobing [1 ]
Kang, Fei [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
关键词
Codes; Heuristic algorithms; Software algorithms; Message systems; Encryption; Software; Instruction sets; Anti-reverse; code transformation; graph theory; cascade encryption; multithreading;
D O I
10.1109/TDSC.2021.3123159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced reverse analysis tools have significantly improved the ability of attackers to crack software via dynamic analysis techniques, such as symbol execution and taint analysis. These techniques are widely used in malicious fields such as vulnerability exploitation or theft of intellectual property. In this paper, we present an obfuscation strategy called "execution trace obfuscation," wherein the program execution trace repeatedly switches between multiple threads. Our technique realizes equivalent code transformation by abstracting the obfuscation problems into pruning, cloning, and coloring problems in graph theory. Based on this, we further propose the cascade encryption of a function that depends on execution trace information with a key derived from the function address calculation process, followed by removing this key from the program. We have implemented a compiler-level system that inputs a source program and automatically generates an obfuscated file. Finally, random test proves the universality of obfuscation algorithm and verify the system's performance. Results shows that our system can effectively interfere advanced reverse analysis tools.
引用
收藏
页码:4156 / 4171
页数:16
相关论文
共 50 条
  • [41] Detecting anomalies in microservices with execution trace comparison
    Meng, Lun
    Ji, Feng
    Sun, Yao
    Wang, Tao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 116 : 291 - 301
  • [42] Execution Trace Graph of Dataflow Process Networks
    Casale-Brunet, Simone
    Mattavelli, Marco
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2018, 4 (03): : 340 - 354
  • [43] Trace-Based Workload Generation and Execution
    Sfakianakis, Yannis
    Kanellou, Eleni
    Marazakis, Manolis
    Bilas, Angelos
    EURO-PAR 2021: PARALLEL PROCESSING, 2021, 12820 : 37 - 54
  • [44] Interactive environment for smart summarization of execution trace
    Setiadi, TE
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 920 - 923
  • [45] Low-Overhead Power Trace Obfuscation for Smart Meter Privacy
    Pagliari, Daniele Jahier
    Vinco, Sara
    Macii, Enrico
    Poncino, Massimo
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [46] Execution Trace Caching for Linear Genetic Programming
    Downey, Carlton
    Zhang, Mengjie
    2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 1186 - 1193
  • [47] MULTILEVEL LABEL PLACEMENT FOR EXECUTION TRACE EVENTS
    Ezzati-Jivan, Naser
    Shameli-Sendi, Alireza
    Dagenais, Michel R.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 740 - 745
  • [48] The Pseudorandom Oracle Model and Ideal Obfuscation
    Jain, Aayush
    Lin, Huijia
    Luo, Ji
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 233 - 262
  • [49] A Model Obfuscation Approach to IoT Security
    Guo, Yunqi
    Tan, Zhaowei
    Chen, Kaiyuan
    Lu, Songwu
    Wu, Ying Nian
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 1 - 9
  • [50] Execution trace-based model verification to analyze multicore and real-time systems
    Beamonte, Raphael
    Ezzati-Jivan, Naser
    Dagenais, Michel R.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (17):