The Community for Technology Leaders
RSS Icon
Krakow, Poland
Feb. 15, 2010 to Feb. 18, 2010
ISBN: 978-0-7695-3965-2
pp: 242-247
Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software licensing or private computing in the cloud. In this paper, we present a program obfuscation method that is based on the combination of strong encryption of code and data and a CPU simulator(CSPIM) that implements the MIPS I instruction set. Our method is different from existing methods in that only a single word (32-bits) of the protected code or data is present as plain-text in main memory. Furthermore, our method allows the possibility of externally supplying the decryption key to the simulator. We have extensively tested the simulator, and it is able to successfully execute C programs compiled by the gcc cross-compiler. Even though purely software-based method cannot provide perfect protection, we argue that this approach significantly raises the bar for reverse-engineers, especially when combined with existing program obfucation techniques.
Vrba, Pâl Halvorsen, Carsten Griwodz, "Program Obfuscation by Strong Cryptography", ARES, 2010, 2012 Seventh International Conference on Availability, Reliability and Security, 2012 Seventh International Conference on Availability, Reliability and Security 2010, pp. 242-247, doi:10.1109/ARES.2010.47
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool