Probabilistic Obfuscation through Covert Channels

被引:4
|
作者
Stephens, Jon [1 ]
Yadegari, Babak [1 ]
Collberg, Christian [1 ]
Debray, Saumya [1 ]
Scheidegger, Carlos [1 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
基金
美国国家科学基金会;
关键词
SOFTWARE; EXECUTION;
D O I
10.1109/EuroSP.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a program obfuscation framework that uses covert channels through the program's execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program's runtime system and/or the operating system. This renders these information flows, and the corresponding control and data dependencies, invisible to program analysis tools such as symbolic execution engines. Additionally, we present the idea of probabilistic obfuscation which uses imperfect covert channels to leak information with some probabilistic guarantees. Experimental evaluation of our approach against state of the art detection and analysis techniques show the engines are not well-equipped to handle these obfuscations, particularly those of the probabilistic variety.
引用
收藏
页码:243 / 257
页数:15
相关论文
共 50 条
  • [21] Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel
    Peter, M.
    Petschick, M.
    Vetter, J.
    Nordholz, J.
    Danisevskis, J.
    Seifert, J. -P.
    INFORMATION SCIENCES AND SYSTEMS 2015, 2016, 363 : 147 - 156
  • [22] TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks
    Ying, Xuhang
    Bernieri, Giuseppe
    Conti, Mauro
    Poovendran, Radha
    ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, : 23 - 34
  • [23] The dilemma of covert channels searching
    Wang, Changda
    Ju, Shiguang
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 169 - 174
  • [24] Concurrent Covert Communication Channels
    Amiruzzaman, Md
    Peyravi, Hassan
    Abdullah-Al-Wadud, M.
    Chung, Yoojin
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 203 - +
  • [25] Data exfiltration and covert channels
    Giani, Annarita
    Berk, Vincent H.
    Cybenko, George V.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [26] COVERT CHANNELS IN LAN PROTOCOLS
    WOLF, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 396 : 91 - 101
  • [27] Multiple access covert channels
    Moskowitz, Ira S.
    Newman, Richard E.
    Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 182 - 188
  • [28] Characterization of Covert Channels in DNS
    Binsalleeh, Hamad
    Kara, A. Mert
    Youssef, Amr
    Debbabi, Mourad
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [29] Oracle attacks and covert channels
    Venturini, I
    DIGITAL WATERMARKING, PROCEEDINGS, 2005, 3710 : 171 - 185
  • [30] Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
    Evtyushkin, Dmitry
    Ponomarev, Dmitry
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 843 - 857