Replacement attacks: automatically evading behavior-based software birthmark

被引:0
|
作者
Zhi Xin
Huiyu Chen
Xinche Wang
Peng Liu
Sencun Zhu
Bing Mao
Li Xie
机构
[1] Nanjing University,State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology
[2] The Pennsylvania State University,College of Information Science and Technology
关键词
Software birthmark; Replacement attack; System call; Dependency graph;
D O I
暂无
中图分类号
学科分类号
摘要
Software birthmarks utilize certain specific program characteristics to validate the origin of software, so it can be applied to detect software piracy. One state-of-the-art technology on software birthmark adopts dynamic system call dependence graphs as the unique signature of a program, which cannot be cluttered by existing obfuscation techniques and is also immune to the no-ops system call insertion attack. In this paper, we analyze its weaknesses and construct replacement attacks with the help of semantics equivalent system calls to unlock the high frequency dependencies between the system calls in the victim’s original system call dependence graph. Our results show that the proposed replacement attacks can destroy the original birthmark successfully.
引用
收藏
页码:293 / 304
页数:11
相关论文
共 50 条
  • [41] Behavior-Based Evacuation Planning
    Rodriguez, Samuel
    Amato, Nancy M.
    2010 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2010, : 350 - 355
  • [42] RoboMusic: a behavior-based approach
    Lund, Henrik
    Ottesen, Martin
    ARTIFICIAL LIFE AND ROBOTICS, 2008, 12 (1-2) : 18 - 23
  • [43] Behavior-based humanoid robotics
    Brooks, RA
    IROS 96 - PROCEEDINGS OF THE 1996 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS - ROBOTIC INTELLIGENCE INTERACTING WITH DYNAMIC WORLDS, VOLS 1-3, 1996, : 1 - 8
  • [44] Behavior-based Adaptive Controller
    Osman, Hassab Elgawi
    2008 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION, 2008, : 30 - 35
  • [45] A BEHAVIOR-BASED ARM CONTROLLER
    CONNELL, JH
    IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, 1989, 5 (06): : 784 - 791
  • [46] Behavior-based model construction
    Steffen, B
    Hungar, H
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2003, 2575 : 5 - 19
  • [47] Experiments with a Behavior-Based Robot
    Das, Barnali
    Ray, Dip Narayan
    Majumder, Somajyoti
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 133 - 141
  • [48] Transparency of Behavior-Based Pricing
    Li, Xi
    Li, Krista J.
    Wang, Xin
    JOURNAL OF MARKETING RESEARCH, 2020, 57 (01) : 78 - 99
  • [49] The Perils of Behavior-Based Personalization
    Zhang, Juanjuan
    MARKETING SCIENCE, 2011, 30 (01) : 170 - 186
  • [50] Behavior-based algorithmic pricing
    Dubus, Antoine
    INFORMATION ECONOMICS AND POLICY, 2024, 66