DocumentCode :
3635184
Title :
Program Obfuscation by Strong Cryptography
Author :
Željko Vrba;Pål Halvorsen;Carsten Griwodz
Author_Institution :
Simula Res. Lab., Oslo, Norway
fYear :
2010
Firstpage :
242
Lastpage :
247
Abstract :
Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software licensing or private computing in the cloud. In this paper, we present a program obfuscation method that is based on the combination of strong encryption of code and data and a CPU simulator(CSPIM) that implements the MIPS I instruction set. Our method is different from existing methods in that only a single word (32-bits) of the protected code or data is present as plain-text in main memory. Furthermore, our method allows the possibility of externally supplying the decryption key to the simulator. We have extensively tested the simulator, and it is able to successfully execute C programs compiled by the gcc cross-compiler. Even though purely software-based method cannot provide perfect protection, we argue that this approach significantly raises the bar for reverse-engineers, especially when combined with existing program obfucation techniques.
Keywords :
"Cryptography","Protection","Licenses","Cloud computing","Computational modeling","Testing","Instruction sets","High level languages","Availability","Security"
Publisher :
ieee
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES ´10 International Conference on
Print_ISBN :
978-1-4244-5879-0
Type :
conf
DOI :
10.1109/ARES.2010.47
Filename :
5438087
Link To Document :
بازگشت