Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359812
|View full text |Cite
|
Sign up to set email alerts
|

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

Abstract: Code obfuscation is a major tool for protecting software intellectual property from attacks such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks based on Dynamic Symbolic Execution (DSE) shows very promising results, hence threatening software integrity. Current defenses are not fully satisfactory, being either not efficient against symbolic reasoning, or affecting runtime performance too much, or being too easy to spot. We present and study a new class of anti-DSE protecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(41 citation statements)
references
References 41 publications
0
33
0
Order By: Relevance
“…KLEE is not only a useful tool for testing software but it's also very effective in attacking several code obfuscation techniques. Current work proposed in [22] tries to hinder symbolic execution tools like KLEE to do their work effectively.…”
Section: Kleementioning
confidence: 99%
See 3 more Smart Citations
“…KLEE is not only a useful tool for testing software but it's also very effective in attacking several code obfuscation techniques. Current work proposed in [22] tries to hinder symbolic execution tools like KLEE to do their work effectively.…”
Section: Kleementioning
confidence: 99%
“…We consider a man-at-the-end (MATE) scenario where the attacker has full access to a protected binary under attack and no access to the source code or unprotected binary. The attack model and the methodology follow closely the survey by Schrittweiser et al [28] and are similar to the ones considered in [22]. To be more concrete, we will focus on the following goals: 1.…”
Section: Motivation 31 Attacker Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Among the countless obfuscation methods proposed [1,16,28,32,36,45,49,51,65,67,69,75], one of the most promising techniques is Virtual Machine (VM)-based obfuscation [28,53]. State-of-the-art, commercial obfuscators such as THEMIDA [50] and VMPROTECT [64], as well as most game copy-protection schemes used in practice [23,60] make extensive use of VM-based obfuscation.…”
Section: Introductionmentioning
confidence: 99%