A Tutorial on Software Obfuscation

Sebastian Banescu, Alexander Pretschner

Publikation: Beitrag in Buch/Bericht/KonferenzbandKapitelBegutachtung

34 Zitate (Scopus)

Abstract

Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity. Digital assets range from media content to code and include items such as: music, movies, computer games, and premium software features. The business model of the creator implies sending digital assets to end-users—such that they can be consumed—in exchange for some form of compensation. A security threat in this context is represented by malicious end-users, who attack the confidentiality or integrity of digital assets, in detriment to digital asset creators and/or other end-users. Software obfuscation transformations have been proposed to protect digital assets against malicious end-users, also called Man-At-The-End (MATE) attackers. Obfuscation transforms a program into a functionally equivalent program which is harder for MATE to attack. However, obfuscation can be use both for benign and malicious purposes. Malware developers rely on obfuscation techniques to circumvent detection mechanisms and to prevent malware analysts from understanding the logic implemented by the malware. This chapter presents a tutorial of the most popular existing software obfuscation transformations and mentions published attacks against each transformation. We present a snapshot of the field of software obfuscation and indicate possible directions, which require more research.

OriginalspracheEnglisch
TitelAdvances in Computers
Redakteure/-innenAtif M. Memon
Herausgeber (Verlag)Academic Press Inc.
Seiten283-353
Seitenumfang71
DOIs
PublikationsstatusVeröffentlicht - 2018

Publikationsreihe

NameAdvances in Computers
Band108
ISSN (Print)0065-2458

Fingerprint

Untersuchen Sie die Forschungsthemen von „A Tutorial on Software Obfuscation“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren