A Tutorial on Software Obfuscation

被引:24
|
作者
Banescu, Sebastian [1 ]
Pretschner, Alexander [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
来源
关键词
CODE; INFORMATION; PROTECTION;
D O I
10.1016/bs.adcom.2017.09.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity. Digital assets range from media content to code and include items such as: music, movies, computer games, and premium software features. The business model of the creator implies sending digital assets to endusers-such that they can be consumed-in exchange for some form of compensation. A security threat in this context is represented by malicious end-users, who attack the confidentiality or integrity of digital assets, in detriment to digital asset creators and/or other end-users. Software obfuscation transformations have been proposed to protect digital assets against malicious end-users, also called Man-At-The-End (MATE) attackers. Obfuscation transforms a program into a functionally equivalent program which is harder for MATE to attack. However, obfuscation can be use both for benign and malicious purposes. Malware developers rely on obfuscation techniques to circumvent detection mechanisms and to prevent malware analysts from understanding the logic implemented by the malware. This chapter presents a tutorial of the most popular existing software obfuscation transformations and mentions published attacks against each transformation. We present a snapshot of the field of software obfuscation and indicate possible directions, which require more research.
引用
收藏
页码:283 / 353
页数:71
相关论文
共 50 条
  • [1] A Breakthrough in Software Obfuscation
    Barak, Boaz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 112 - 112
  • [2] Hardware Obfuscation and Logic Locking: A Tutorial Introduction
    Hoque, Tamzidul
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. IEEE DESIGN & TEST, 2020, 37 (03) : 59 - 77
  • [3] A Tutorial on Design Obfuscation: from Transistors to Systems
    Pagliarini, Samuel
    [J]. 2021 IEEE 22ND LATIN AMERICAN TEST SYMPOSIUM (LATS2021), 2021,
  • [4] TUTORIAL SOFTWARE
    DUHRKOPF, R
    [J]. AMERICAN BIOLOGY TEACHER, 1993, 55 (02): : 123 - 124
  • [5] Forensic and Software (UN) Obfuscation
    Desnos, Anthony
    Vanderbeken, Eloi
    [J]. PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
  • [6] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    [J]. Cybersecurity, 3
  • [7] Hopes, Fears, and Software Obfuscation
    Barak, Boaz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (03) : 88 - 96
  • [8] Methods and Software for the Program Obfuscation
    Shevtsova, O. O.
    Buintsev, D. N.
    [J]. SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
  • [9] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [10] Arena® software tutorial
    Takus, DA
    Profozich, DM
    [J]. PROCEEDINGS OF THE 1997 WINTER SIMULATION CONFERENCE, 1997, : 541 - 544