Falcarin, Paolo and Di Carlo, Stefano and Cabutto, Alessandro and Garazzino, Nicola and Barberis, Davide (2011) ‘Exploiting Code Mobility for Dynamic Binary Obfuscation’, IEEE World Congress on Internet Security (WorldCIS-2011), London, 21-23 February 2011. London: IEEE pp. 114 – 120..
Use this permanent URL when citing or linking to this resource in ROAR.
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectiveness.
|Divisions:||Schools > Architecture Computing and Engineering, School of|
|Additional Information:||Citation: Falcarin, P., Di Carlo, S., Cabutto, A., Garazzino, N., Barberis, D. (2011) ‘Exploiting Code Mobility for Dynamic Binary Obfuscation’ IEEE World Congress on Internet Security (WorldCIS-2011), London, 21-23 February 2011. London: IEEE pp.114 – 120..|
|Date Deposited:||03 May 2011 14:37|
|Item Type:||Conference or Event Item (Paper)|
|Creators:||Falcarin, Paolo and Di Carlo, Stefano and Cabutto, Alessandro and Garazzino, Nicola and Barberis, Davide|
|Last Modified:||31 May 2013 15:25|
|Depositing User:||Stephen Grace|