Program obfuscation by strong cryptography

被引:8
|
作者
Vrba, Zeljko [1 ]
Halvorsen, Pal [1 ]
Griwodz, Carsten [1 ]
机构
[1] Simula Res Lab, Oslo, Norway
关键词
D O I
10.1109/ARES.2010.47
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software licensing or private computing in the cloud. In this paper, we present a program obfuscation method that is based on the combination of strong encryption of code and data and a CPU simulator (CSPIM) that implements the MIPS I instruction set. Our method is different from existing methods in that only a single word (32-bits) of the protected code or data is present as plain-text in main memory. Furthermore, our method allows the possibility of externally supplying the decryption key to the simulator. We have extensively tested the simulator, and it is able to successfully execute C programs compiled by the gcc cross-compiler. Even though purely software-based method cannot provide perfect protection, we argue that this approach significantly raises the bar for reverse-engineers, especially wen combined with existing program obfucation techniques.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [1] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [2] Use of cryptography in malware obfuscation
    Asghar, Hassan Jameel
    Zhao, Benjamin Zi Hao
    Ikram, Muhammad
    Nguyen, Giang
    Kaafar, Dali
    Lamont, Sean
    Coscia, Daniel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 135 - 152
  • [3] On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
    Bitansky, Nir
    Paneth, Omer
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 241 - 250
  • [4] Cryptography for Parallel RAM from Indistinguishability Obfuscation
    Chen, Yu-Chi
    Chow, Sherman S. M.
    Chung, Kai-Min
    Lai, Russell W. F.
    Lin, Wei-Kai
    Zhou, Hong-Sheng
    [J]. ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, : 179 - 190
  • [5] Incremental Program Obfuscation
    Garg, Sanjam
    Pandey, Omkant
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 193 - 223
  • [6] Hardware Obfuscation using Strong PUFs
    Khaleghi, Soroush
    Rao, Wenjing
    [J]. 2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 321 - 326
  • [7] On Strong Simulation and Composable Point Obfuscation
    Bitansky, Nir
    Canetti, Ran
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 520 - 537
  • [8] On Strong Simulation and Composable Point Obfuscation
    Bitansky, Nir
    Canetti, Ran
    [J]. JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 317 - 357
  • [9] Methods and Software for the Program Obfuscation
    Shevtsova, O. O.
    Buintsev, D. N.
    [J]. SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
  • [10] On Strong Simulation and Composable Point Obfuscation
    Nir Bitansky
    Ran Canetti
    [J]. Journal of Cryptology, 2014, 27 : 317 - 357