Software Protection with Code Mobility
Book chapter
Cabutto, Alessandro, Falcarin, P., Abrath, Bert, Coppens, Bart and De Sutter, Bjorn 2015. Software Protection with Code Mobility. in: MTD '15-- Proceedings of the Second ACM Workshop on Moving Target Defense Association for Computing Machinery (ACM). pp. 95-103
Authors | Cabutto, Alessandro, Falcarin, P., Abrath, Bert, Coppens, Bart and De Sutter, Bjorn |
---|---|
Abstract | The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, identifying sensitive algorithms or tamper with the code to disable protections (e.g. license checks or DRM) embedded in binary code, or use the software in an unauthorized manner. Code Mobility can be used to thwart code analysis and debugging by removing parts of the code from the deployed software program and installing it at run-time by downloading binary code blocks from a trusted server. The proposed architecture of the code mobility protection downloads mobile code blocks, which are allocated dynamically at addresses determined at run-time; control transfers into and out of mobile code blocks are rewritten using the Diablo binary-rewriter tool. |
Book title | MTD '15-- Proceedings of the Second ACM Workshop on Moving Target Defense |
Page range | 95-103 |
Year | 2015 |
Publisher | Association for Computing Machinery (ACM) |
Publication dates | |
12 Oct 2015 | |
Publication process dates | |
Deposited | 04 Nov 2016 |
Event | Second ACM Workshop on Moving Target Defense MTD 2015 |
ISBN | 978-1-4503-3823-3 |
Funder | European Union Seventh Framework Programme |
Web address (URL) | http://dx.doi.org/10.1145/2808475.2808481 |
Additional information | © 2015 ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in MTD '15-- Proceedings of the Second ACM Workshop on Moving Target Defense, http://dx.doi.org/10.1145/2808475.2808481 |
Accepted author manuscript | License CC BY-NC-ND |
https://repository.uel.ac.uk/item/8545x
Download files
261
total views252
total downloads8
views this month3
downloads this month