DocumentCode :
1753915
Title :
Exploiting code mobility for dynamic binary obfuscation
Author :
Falcarin, Paolo ; Carlo, Stefano Di ; Cabutto, Alessandro ; Garazzino, Nicola ; Barberis, Davide
Author_Institution :
Comput., Univ. of East London, London, UK
fYear :
2011
fDate :
21-23 Feb. 2011
Firstpage :
114
Lastpage :
120
Abstract :
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectiveness.
Keywords :
reverse engineering; security of data; software engineering; binary obfuscation approach; code mobility; dynamic software analysis; incomplete application deployment; mobile code blocks; reverse engineering; software protection; static software analysis; trusted network entity; Binary codes; Instruments; Mobile communication; Reverse engineering; Servers; Software; Software protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Security (WorldCIS), 2011 World Congress on
Conference_Location :
London
Print_ISBN :
978-1-4244-8879-7
Electronic_ISBN :
978-0-9564263-7-6
Type :
conf
Filename :
5749894
Link To Document :
بازگشت