Sciweavers

Share
CCS
2015
ACM

Software Protection with Code Mobility

3 years 14 hour ago
Software Protection with Code Mobility
The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, identifying sensitive algorithms or tamper with the code to disable protections (e.g. license checks or DRM) embedded in binary code, or use the software in an unauthorized manner. Code Mobility can be used to thwart code analysis and debugging by removing parts of the code from the deployed software program and installing it at runtime by downloading binary code blocks from a trusted server. The proposed architecture of the code mobility protection downloads mobile code blocks, which are allocated dynamically at addresses determined at run-time; control transfers into and out of mobile code blocks are rewritten using the Diablo binaryrewriter tool. Categories and Subject Descriptors D.2.0 [Software Engineering]: General – Protection mechanisms. General Terms Security, Reverse engineering. Keywords Code Mob...
Alessandro Cabutto, Paolo Falcarin, Bert Abrath, B
Added 17 Apr 2016
Updated 17 Apr 2016
Type Journal
Year 2015
Where CCS
Authors Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter
Comments (0)
books