DocumentCode :
2628445
Title :
Obfuscated Dechiper Routine Analysis Using Theorem Prover for Information Protection
Author :
Ando, Ruo ; Furukawa, Kouichi
Author_Institution :
Nat. Inst. of Inf. & Commun. Technol., Tokyo
fYear :
2007
fDate :
21-23 Nov. 2007
Firstpage :
1797
Lastpage :
1800
Abstract :
Information leak has been increasing, which imposes a great burden on IT business. Software protection and trusted computing are promising technologies to cope with malicious or illegal access to mission-critical servers. Code obfuscation and encryption are important techniques for software protection. In this paper, we present an obfuscated decipher routine analysis using theorem prover. For detecting parameters of decipher routine, we apply equality substitution techniques called paramodulation and demodulation. Besides, we apply look-ahead strategies to speed up our analysis. Experimental result shows that FoL theorem prover works well for analyzing obfuscated decipher routine, particularly detecting parameters. Theorem prover is effective tool for enhancing information protection.
Keywords :
commerce; cryptography; software engineering; theorem proving; IT business; encryption; equality substitution technique; information protection; mission-critical servers; obfuscated dechiper routine analysis; software protection; theorem proving; trusted computing; Assembly; Business communication; Communications technology; Counting circuits; Cryptography; Demodulation; Information analysis; Information technology; Mission critical systems; Software protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Convergence Information Technology, 2007. International Conference on
Conference_Location :
Gyeongju
Print_ISBN :
0-7695-3038-9
Type :
conf
DOI :
10.1109/ICCIT.2007.107
Filename :
4420512
Link To Document :
بازگشت