• DocumentCode
    728941
  • Title

    Obfuscating Windows DLLs

  • Author

    Abrath, Bert ; Coppens, Bart ; Volckaert, Stijn ; De Sutter, Bjorn

  • Author_Institution
    Dept. of Electron. & Inf. Syst., Ghent Univ., Ghent, Belgium
  • fYear
    2015
  • fDate
    19-19 May 2015
  • Firstpage
    24
  • Lastpage
    30
  • Abstract
    We present two techniques to obfuscate the interfaces between application binaries and Windows system DLLs (dynamic-link libraries). The first technique obfuscates the related symbol information in the binary to prevent static analyses from identifying the invoked library functions. The second technique combines static linking with code obfuscation to avoid the external interface altogether, thus preventing dynamic attacks as well. This is done while still maintaining compatibility with multiple Windows versions, through run-time adaptation of the application. As the first concrete result of this ongoing research, we demonstrate and evaluate the techniques using a proof-of-concept tool applied to a simple test program.
  • Keywords
    program testing; security of data; software libraries; user interfaces; Windows system DLL; code obfuscation; dynamic attacks prevention; dynamic-link libraries; program testing; proof-of-concept tool; static analysis; Joining processes; Kernel; Libraries; Linux; Prototypes; Transforms; Windows; binary rewriting; obfuscation; static linking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
  • Conference_Location
    Florence
  • Type

    conf

  • DOI
    10.1109/SPRO.2015.13
  • Filename
    7174807