Sciweavers

Share
IEEEARES
2010
IEEE

Program Obfuscation by Strong Cryptography

11 years 8 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software licensing or private computing in the cloud. In this paper, we present a program obfuscation method that is based on the combination of strong encryption of code and data and a CPU simulator (CSPIM) that implements the MIPS I instruction set. Our method is different from existing methods in that only a single word (32bits) of the protected code or data is present as plain-text in main memory. Furthermore, our method allows the possibility of externally supplying the decryption key to the simulator. We have extensively tested the simulator, and it is able to successfully execute C programs compiled by the gcc cross-compiler. Even though purely software-based method cannot provide perfect protection, we argue that this approach significantly raises the bar for reverse-engineers, especially wen combined with exist...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
Added 17 May 2010
Updated 17 May 2010
Type Conference
Year 2010
Where IEEEARES
Authors Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
Comments (0)
books