Probabilistic Obfuscation through Covert Channels

被引:4
|
作者
Stephens, Jon [1 ]
Yadegari, Babak [1 ]
Collberg, Christian [1 ]
Debray, Saumya [1 ]
Scheidegger, Carlos [1 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
基金
美国国家科学基金会;
关键词
SOFTWARE; EXECUTION;
D O I
10.1109/EuroSP.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a program obfuscation framework that uses covert channels through the program's execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program's runtime system and/or the operating system. This renders these information flows, and the corresponding control and data dependencies, invisible to program analysis tools such as symbolic execution engines. Additionally, we present the idea of probabilistic obfuscation which uses imperfect covert channels to leak information with some probabilistic guarantees. Experimental evaluation of our approach against state of the art detection and analysis techniques show the engines are not well-equipped to handle these obfuscations, particularly those of the probabilistic variety.
引用
收藏
页码:243 / 257
页数:15
相关论文
共 50 条
  • [31] Mathematical models of the covert channels
    Grusho, A
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 15 - 20
  • [32] Covert capacity of bosonic channels
    Gagatsos C.N.
    Bullock M.S.
    Bash B.A.
    IEEE Journal on Selected Areas in Information Theory, 2020, 1 (02): : 555 - 567
  • [33] COVERT CHANNELS IN LAN PROTOCOLS
    WOLF, M
    LOCAL AREA NETWORK SECURITY, 1989, 396 : 91 - 101
  • [34] TAMBUS: A novel authentication method through covert channels for securing industrial networks
    Bernieri, Giuseppe
    Cecconello, Stefano
    Conti, Mauro
    Lain, Gianluca
    COMPUTER NETWORKS, 2020, 183 (183)
  • [35] Probabilistic Covert Transmission in IoT Networks
    Zhou, Yahui
    Chen, Rui
    Zhao, Zhongling
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [36] Using A Probabilistic Model Of Context To Detect Word Obfuscation
    Jabbari, Sanaz
    Allison, Ben
    Guthrie, Louise
    SIXTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, LREC 2008, 2008, : 2216 - 2220
  • [37] OBFUSCATION OF INTERACTION THROUGH INCANTATION
    HIRSCH, J
    BEHAVIORAL AND BRAIN SCIENCES, 1991, 14 (03) : 397 - 397
  • [38] Better Security Through Obfuscation
    不详
    COMMUNICATIONS OF THE ACM, 2021, 64 (08) : 13 - 14
  • [39] Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
    Gautam S.
    Pattani K.
    Zuhair M.
    Rashid M.
    Ahmad N.
    International Journal of Intelligent Networks, 2023, 4 : 337 - 348
  • [40] COVERT FLOW TREES - A VISUAL APPROACH TO ANALYZING COVERT STORAGE CHANNELS
    KEMMERER, RA
    PORRAS, PA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1991, 17 (11) : 1166 - 1185