• DocumentCode
    1753915
  • Title

    Exploiting code mobility for dynamic binary obfuscation

  • Author

    Falcarin, Paolo ; Carlo, Stefano Di ; Cabutto, Alessandro ; Garazzino, Nicola ; Barberis, Davide

  • Author_Institution
    Comput., Univ. of East London, London, UK
  • fYear
    2011
  • fDate
    21-23 Feb. 2011
  • Firstpage
    114
  • Lastpage
    120
  • Abstract
    Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectiveness.
  • Keywords
    reverse engineering; security of data; software engineering; binary obfuscation approach; code mobility; dynamic software analysis; incomplete application deployment; mobile code blocks; reverse engineering; software protection; static software analysis; trusted network entity; Binary codes; Instruments; Mobile communication; Reverse engineering; Servers; Software; Software protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Security (WorldCIS), 2011 World Congress on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4244-8879-7
  • Electronic_ISBN
    978-0-9564263-7-6
  • Type

    conf

  • Filename
    5749894