Abstract | ||
---|---|---|
Sensitive parts of a program, such as proprietary algorithms or licensing information, are often protected with the help of code obfuscation techniques. Many obfuscation schemes transform the control flow of the protected program. Typically, the control flow of obfuscated programs is deterministic, i.e., recorded execution traces do not differ for multiple executions using the same input values. An adversary can take advantage of this behavior and create multiple traces to perform analyses on the target program in order to deobfuscate it. In this paper, we introduce an obfuscation approach which yields probabilistic control flow within a given method. That is, for the same input values, multiple execution traces differ, whilst preserving semantics. This effectively renders analyses relying on multiple traces impractical. We have implemented a prototype and applied it to several different programs. Our experimental results show that our approach can be used to ensure divergent traces for the same input values and that it can significantly improve the resilience against dynamic analysis. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-319-40667-1_9 | DIMVA |
Field | DocType | Citations |
Psychological resilience,Computer science,Control flow,Probabilistic logic,Adversary,Obfuscation (software),Obfuscation,Semantics,Distributed computing | Conference | 6 |
PageRank | References | Authors |
0.43 | 16 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Andre Pawlowski | 1 | 22 | 2.93 |
Moritz Contag | 2 | 81 | 4.04 |
T HORSTEN HOLZ | 3 | 3532 | 232.93 |