2017 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computed, Scalable Computing &Amp; Commun 2017
DOI: 10.1109/uic-atc.2017.8397540
|View full text |Cite
|
Sign up to set email alerts
|

Exploit dynamic data flows to protect software against semantic attacks

Abstract: Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine based code obfuscation is emerging as a powerful technique for software protection. However, the current code obfuscation techniques are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program to construct a simpler program that is functionally equivalent to the obfuscated program but easier to analyze. This paper presents DSA-VMP, a novel VM-based code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The second category is semantic attacks, where the attackers collect the victim information through some websites or links that looks like trusted websites or to acquire his/her username, password, and credit card information [4]. Table 1 shows some types of semantic attacks and a brief description for them [5].…”
Section: Introductionmentioning
confidence: 99%
“…The second category is semantic attacks, where the attackers collect the victim information through some websites or links that looks like trusted websites or to acquire his/her username, password, and credit card information [4]. Table 1 shows some types of semantic attacks and a brief description for them [5].…”
Section: Introductionmentioning
confidence: 99%
“…Virtual IS (Instruction Set) is the kernel part of this system. The interpreter will been used to convert IS into native code of Virtual instruction interpretation according to the classical decode-dispatch method [18], using a set of handlers and a VMloop. In this system, VMloop is the execution engine to fetch and decode the bytecode instructions and dispatch handler to interpret the instructions.…”
Section: Introductionmentioning
confidence: 99%
“…At the heart of this system are the virtual IS (Instruction Set) and the set of interpreters used to translate the IS to native code. Interpretation of virtual instructions follows the classical decode-dispatch approach [18], using a bundle of handlers and a VMloop. Here, the VMloop is the execution engine which fetches and decodes a bytecode instruction and then dispatches a handler to interpret instruction.…”
Section: Introductionmentioning
confidence: 99%