Probabilistic Obfuscation through Covert Channels

被引:4
|
作者
Stephens, Jon [1 ]
Yadegari, Babak [1 ]
Collberg, Christian [1 ]
Debray, Saumya [1 ]
Scheidegger, Carlos [1 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
基金
美国国家科学基金会;
关键词
SOFTWARE; EXECUTION;
D O I
10.1109/EuroSP.2018.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a program obfuscation framework that uses covert channels through the program's execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program's runtime system and/or the operating system. This renders these information flows, and the corresponding control and data dependencies, invisible to program analysis tools such as symbolic execution engines. Additionally, we present the idea of probabilistic obfuscation which uses imperfect covert channels to leak information with some probabilistic guarantees. Experimental evaluation of our approach against state of the art detection and analysis techniques show the engines are not well-equipped to handle these obfuscations, particularly those of the probabilistic variety.
引用
收藏
页码:243 / 257
页数:15
相关论文
共 50 条
  • [41] Problems of Modeling in the Analysis of Covert Channels
    Grusho, Alexander
    Grusho, Nikolai
    Timonina, Elena
    COMPUTER NETWORK SECURITY, 2010, 6258 : 118 - +
  • [42] Capacity Theorems for Covert Bosonic Channels
    Bullock, Michael S.
    Gagatsos, Christos N.
    Bash, Boulat A.
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [43] Secure Covert Channels in Multiplayer Games
    Diehl, Malte
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 117 - 122
  • [44] Covert Channels in Transport Layer Security
    Heinz, Corinna
    Mazurczyk, Wojciech
    Caviglione, Luca
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [45] Covert Communications in Packet Collision Channels
    Sheikholeslami, Azadeh
    Ghaderi, Majid
    Goeckel, Dennis
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [46] Embedding covert channels into TCP/IP
    Murdoch, SJ
    Lewis, S
    INFORMATION HIDING, 2005, 3727 : 247 - 261
  • [47] Detecting Protocol Switching Covert Channels
    Wendzel, Steffen
    Zander, Sebastian
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 280 - 283
  • [48] Constructing and Characterizing Covert Channels on GPGPUs
    Naghibijouybari, Hoda
    Khasawneh, Khaled N.
    Abu-Ghazaleh, Nael
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 354 - 366
  • [49] On Robust Covert Channels Inside DNS
    Nussbaum, Lucas
    Neyron, Pierre
    Richard, Olivier
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 51 - 62
  • [50] Crafting web counters into covert channels
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 337 - +