Flexible software protection
نویسندگان
چکیده
To counter software reverse engineering or tampering, obfuscation tools can be used. However, such to a large degree hard-code how the obfuscations are deployed. They hence lack resilience and stealth in face of many attacks. this problem, we propose novel concept flexible obfuscators, which implement protections terms data structures APIs already present application protected. The tailored they deployed, making them less learnable distinguishable. In our research, concretized protection for opaque predicates. We designed an interface enable reuse existing injected predicates, analyzed their stealth, implemented proof-of-concept obfuscator, evaluated it on number real-world use cases. This paper presents in-depth motivation work, design interface, security analysis, feasibility report based experimental evaluation. findings that predicates indeed provide strong improved but also deployment is costly, should used sparsely protect only most security-sensitive code fragments do not dominate performance. Flexible therefor delivers expensive more durable new weapon ever ongoing arms race.
منابع مشابه
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper we present an efficient and tunable approach to some problems in embedded software protection that utilizes a ha...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملFlexible Aliasing with Protection
Unwanted effects of aliasing cause encapsulation problems in object oriented programming. Nevertheless, aliasing is part of common and efficient programming techniques for expressing sharing of objects and as such its general restriction is not an option in practice. We present an approach that allows full referential object sharing, but adds access control to object references to limit the eff...
متن کاملFlexible Alias Protection
Aliasing is endemic in object oriented programming. Because an object can be modified via any alias, object oriented programs are hard to understand, maintain, and analyse. Flexible alias protection is a conceptual model of inter-object relationships which limits the visibility of changes via aliases, allowing objects to be aliased but mitigating the undesirable effects of aliasing. Flexible al...
متن کاملAdvanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today’s technologies, that provides traitor tracing and license-enforcement functionalities, and requires no additional hardware nor inter-connectivity other than those needed to execute the respective protected software. In [1] authors introduce the secure triggers and show that it is secure, modulo the existe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2022
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2022.102636