TU Darmstadt / ULB / TUbiblio

AES-SEC: Improving software obfuscation through hardware-assistance (short paper)

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Merzdovnik, Georg and Kieseberg, Peter and Weippl, Edgar (2014):
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, IEEE Computer Society, Fribourg, Switzerland, In: ARES '14, ISBN 978-1-4799-4223-7,
DOI: 10.1109/ARES.2014.32,
[Conference or Workshop Item]

Abstract

While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis. Almost no systematic research has been done on the interplay between hardware and software based protection mechanism. In this paper, we propose modifications to Intel's AES-NI instruction set in order to make it suitable for application in software protection scenarios and demonstrate its integration into a control flow obfuscation scheme. Our novel approach provides strong hardware-software binding and restricts the attack context to pure dynamic analysis - two major limiting factors of reverse engineering - to delay a successful attack against a program.

Item Type: Conference or Workshop Item
Erschienen: 2014
Creators: Schrittwieser, Sebastian and Katzenbeisser, Stefan and Merzdovnik, Georg and Kieseberg, Peter and Weippl, Edgar
Title: AES-SEC: Improving software obfuscation through hardware-assistance (short paper)
Language: German
Abstract:

While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis. Almost no systematic research has been done on the interplay between hardware and software based protection mechanism. In this paper, we propose modifications to Intel's AES-NI instruction set in order to make it suitable for application in software protection scenarios and demonstrate its integration into a control flow obfuscation scheme. Our novel approach provides strong hardware-software binding and restricts the attack context to pure dynamic analysis - two major limiting factors of reverse engineering - to delay a successful attack against a program.

Title of Book: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages
Series Name: ARES '14
Publisher: IEEE Computer Society
ISBN: 978-1-4799-4223-7
Uncontrolled Keywords: Hardware, Software, Registers, Encryption, Microprocessors, Software protection
Divisions: Profile Areas > Cybersecurity (CYSEC)
Profile Areas
Event Location: Fribourg, Switzerland
Date Deposited: 24 Aug 2017 16:18
DOI: 10.1109/ARES.2014.32
Identification Number: TUD-CS-2014-1112
Export:

Optionen (nur für Redakteure)

View Item View Item