2020
DOI: 10.1007/s10207-020-00494-8
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscated integration of software protections

Abstract: To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application. It is well-known, however, that attackers can exploit the modular nature of applications and their protections to speed up the identification and comprehension process of the relevant code, the assets, and the applied protections. To counter that exploitation of modularity at different levels of granularity, the boundaries betwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Van den Broeck et al proposed a third application of two-way OPs, namely to connect unrelated code fragments from different functions, with the goal of hampering disassemblers that partitioning the code into components such as functions [24]. They do this by merging control flow paths from different code contexts in different components, if possible in combination with outlining of equivalent fragments from those contexts.…”
Section: Flexible Opaque Predicatesmentioning
confidence: 99%
See 3 more Smart Citations
“…Van den Broeck et al proposed a third application of two-way OPs, namely to connect unrelated code fragments from different functions, with the goal of hampering disassemblers that partitioning the code into components such as functions [24]. They do this by merging control flow paths from different code contexts in different components, if possible in combination with outlining of equivalent fragments from those contexts.…”
Section: Flexible Opaque Predicatesmentioning
confidence: 99%
“…Our proof of concept implementation applies the principles introduced in Section 2 to one-way predicates used to inject bogus control flow like Collberg's alias-based OPs and to the two-way opaque dispatchers proposed by Van den Broeck et al [24]. For the one-way predicates, we support flow-sensitive as well as flow-insensitive invariants in complex data structures.…”
Section: Flexible Opaque Predicatesmentioning
confidence: 99%
See 2 more Smart Citations
“…While potency, resilience, and stealth are commonly accepted criteria that should be evaluated [25], no standardized metrics are available for them. Complexity metrics originating from the field of software engineering have been proposed [18] and ad-hoc metrics are used in academic papers [54,71], but none have been empirically validated in the context of MATE SP, and none of them are trusted in practice, i.e., are deemed a sufficient replacement for human expertise and pen testing.…”
Section: Challenges Towards Standardizationmentioning
confidence: 99%