Flexible software protection

نویسندگان

چکیده

To counter software reverse engineering or tampering, obfuscation tools can be used. However, such to a large degree hard-code how the obfuscations are deployed. They hence lack resilience and stealth in face of many attacks. this problem, we propose novel concept flexible obfuscators, which implement protections terms data structures APIs already present application protected. The tailored they deployed, making them less learnable distinguishable. In our research, concretized protection for opaque predicates. We designed an interface enable reuse existing injected predicates, analyzed their stealth, implemented proof-of-concept obfuscator, evaluated it on number real-world use cases. This paper presents in-depth motivation work, design interface, security analysis, feasibility report based experimental evaluation. findings that predicates indeed provide strong improved but also deployment is costly, should used sparsely protect only most security-sensitive code fragments do not dominate performance. Flexible therefor delivers expensive more durable new weapon ever ongoing arms race.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible Software Protection Using Hardware/Software Codesign Techniques

A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper we present an efficient and tunable approach to some problems in embedded software protection that utilizes a ha...

متن کامل

Chemical Engineering Software and Legal Protection Thereof

In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy.  This paper explores the ...

متن کامل

Flexible Aliasing with Protection

Unwanted effects of aliasing cause encapsulation problems in object oriented programming. Nevertheless, aliasing is part of common and efficient programming techniques for expressing sharing of objects and as such its general restriction is not an option in practice. We present an approach that allows full referential object sharing, but adds access control to object references to limit the eff...

متن کامل

Flexible Alias Protection

Aliasing is endemic in object oriented programming. Because an object can be modified via any alias, object oriented programs are hard to understand, maintain, and analyse. Flexible alias protection is a conceptual model of inter-object relationships which limits the visibility of changes via aliases, allowing objects to be aliased but mitigating the undesirable effects of aliasing. Flexible al...

متن کامل

Advanced Software Protection Now

We introduce a novel software-protection method, which can be fully implemented with today’s technologies, that provides traitor tracing and license-enforcement functionalities, and requires no additional hardware nor inter-connectivity other than those needed to execute the respective protected software. In [1] authors introduce the secure triggers and show that it is secure, modulo the existe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2022

ISSN: ['0167-4048', '1872-6208']

DOI: https://doi.org/10.1016/j.cose.2022.102636