TU Darmstadt / ULB / TUbiblio

AES-SEC: Improving software obfuscation through hardware-assistance (short paper)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar (2014)
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
Fribourg, Switzerland
doi: 10.1109/ARES.2014.32
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis. Almost no systematic research has been done on the interplay between hardware and software based protection mechanism. In this paper, we propose modifications to Intel's AES-NI instruction set in order to make it suitable for application in software protection scenarios and demonstrate its integration into a control flow obfuscation scheme. Our novel approach provides strong hardware-software binding and restricts the attack context to pure dynamic analysis - two major limiting factors of reverse engineering - to delay a successful attack against a program.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2014
Autor(en): Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar
Art des Eintrags: Bibliographie
Titel: AES-SEC: Improving software obfuscation through hardware-assistance (short paper)
Sprache: Deutsch
Publikationsjahr: September 2014
Verlag: IEEE Computer Society
Buchtitel: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages
Reihe: ARES '14
Veranstaltungsort: Fribourg, Switzerland
DOI: 10.1109/ARES.2014.32
Kurzbeschreibung (Abstract):

While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis. Almost no systematic research has been done on the interplay between hardware and software based protection mechanism. In this paper, we propose modifications to Intel's AES-NI instruction set in order to make it suitable for application in software protection scenarios and demonstrate its integration into a control flow obfuscation scheme. Our novel approach provides strong hardware-software binding and restricts the attack context to pure dynamic analysis - two major limiting factors of reverse engineering - to delay a successful attack against a program.

Freie Schlagworte: Hardware, Software, Registers, Encryption, Microprocessors, Software protection
ID-Nummer: TUD-CS-2014-1112
Fachbereich(e)/-gebiet(e): Profilbereiche > Cybersicherheit (CYSEC)
Profilbereiche
Hinterlegungsdatum: 24 Aug 2017 16:18
Letzte Änderung: 15 Mai 2018 10:33
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen