Abstract | ||
---|---|---|
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software. Browser hijacking malware is one popular example that aims at changing web-browser settings such as the default search engine or the home page. Changeware tends to provoke end-user dissatisfaction with the target application, e.g. due to repeated failure of persisting the desired configuration. We describe a solution to counter changeware, to be employed by vendors of software targeted by changeware. It combines several protection mechanisms: white-box cryptography to hide a cryptographic key, software diversity to counter automated key retrieval attacks, and run-time process memory integrity checking to avoid illegitimate calls of the developed API. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1145/2699026.2699099 | CODASPY |
Keywords | Field | DocType |
software protection,invasive software,software diversity,malware defense,integrity protection,white-box cryptography,obfuscation | Cryptovirology,Internet privacy,Cryptography,Computer science,Computer security,Software,Malware,Obfuscation,Home page,Key (cryptography),Software diversity | Conference |
Citations | PageRank | References |
3 | 0.38 | 17 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sebastian Banescu | 1 | 100 | 12.12 |
Alexander Pretschner | 2 | 19 | 4.74 |
Dominic Battré | 3 | 257 | 20.40 |
Stéfano Cazzulani | 4 | 3 | 0.38 |
Robert Shield | 5 | 16 | 1.41 |
Greg Thompson | 6 | 9 | 1.24 |