DocumentCode
1753915
Title
Exploiting code mobility for dynamic binary obfuscation
Author
Falcarin, Paolo ; Carlo, Stefano Di ; Cabutto, Alessandro ; Garazzino, Nicola ; Barberis, Davide
Author_Institution
Comput., Univ. of East London, London, UK
fYear
2011
fDate
21-23 Feb. 2011
Firstpage
114
Lastpage
120
Abstract
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectiveness.
Keywords
reverse engineering; security of data; software engineering; binary obfuscation approach; code mobility; dynamic software analysis; incomplete application deployment; mobile code blocks; reverse engineering; software protection; static software analysis; trusted network entity; Binary codes; Instruments; Mobile communication; Reverse engineering; Servers; Software; Software protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Security (WorldCIS), 2011 World Congress on
Conference_Location
London
Print_ISBN
978-1-4244-8879-7
Electronic_ISBN
978-0-9564263-7-6
Type
conf
Filename
5749894
Link To Document