• DocumentCode
    498540
  • Title

    Runtime Protection via Dataflow Flattening

  • Author

    Anckaert, B. ; Jakubowski, M.H. ; Venkatesan, R. ; Chit Wei Saw

  • Author_Institution
    Dept. of Electron. & Inf. Syst., Ghent Univ., Ghent, Belgium
  • fYear
    2009
  • fDate
    18-23 June 2009
  • Firstpage
    242
  • Lastpage
    248
  • Abstract
    Software running on an open architecture, such as the PC, is vulnerable to inspection and modification. Since software may process valuable or sensitive information, many defenses against data analysis and modification have been proposed. This paper complements existing work and focuses on hiding data location throughout program execution. To achieve this, we combine three techniques: (i) periodic reordering of the heap, (ii) migrating local variables from the stack to the heap and (iii) pointer scrambling. By essentially flattening the dataflow graph of the program, the techniques serve to complicate static dataflow analysis and dynamic data tracking. Our methodology can be viewed as a data-oriented analogue of control-flow flattening techniques. Dataflow flattening is useful in practical scenarios like DRM, information-flow protection, and exploit resistance. Our prototype implementation compiles C programs into a binary for which every access to the heap is redirected through a memory management unit. Stack-based variables may be migrated to the heap, while pointer accesses and arithmetic may be scrambled and redirected. We evaluate our approach experimentally on the SPEC CPU2006 benchmark suite.
  • Keywords
    data encapsulation; data flow analysis; data flow graphs; security of data; software architecture; C-program compiling; SPEC CPU2006 benchmark suite; control-flow flattening techniques; data location hiding; data-oriented analogue; dataflow flattening; dataflow graph; dynamic data tracking; information-flow protection; memory management unit; stack-based variables; static dataflow analysis; Application software; Automata; Computer architecture; Data analysis; Data security; Embedded software; Inspection; Memory management; Runtime; Software protection; data hiding; obfuscation; security; software protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on
  • Conference_Location
    Athens, Glyfada
  • Print_ISBN
    978-0-7695-3668-2
  • Type

    conf

  • DOI
    10.1109/SECURWARE.2009.44
  • Filename
    5211006