Hybrid static-dynamic attacks against software protection mechanisms

Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere
{"title":"Hybrid static-dynamic attacks against software protection mechanisms","authors":"Matias Madou, Bertrand Anckaert, B. D. Sutter, K. D. Bosschere","doi":"10.1145/1102546.1102560","DOIUrl":null,"url":null,"abstract":"Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"73","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1102546.1102560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 73

Abstract

Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on different forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attacks. While this type of attack is already commonly used by black-hats, this is one of the first scientific papers to discuss the potential of these attacks through which an attacker can analyze, control and modify a program extensively. The concepts are illustrated through a case study of a recently proposed algorithm for software watermarking [6].
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对软件防护机制的静态-动态混合攻击
逆向工程和程序分析的进步使软件极易受到恶意主机攻击。这些攻击通常采取侵犯知识产权的形式,软件需要受到保护。需要保护的知识产权可以有不同的形式。例如,软件本身可能由专有算法和数据结构组成,或者它可以提供对受版权保护的材料的受控访问。因此,近年来,人们探索了许多保护软件的技术。这些技术中的许多都提供了合理的安全级别,以防止仅静态攻击。然而,它们中的许多都不能解决动态或静态-动态混合攻击的问题。虽然这种类型的攻击已经被黑帽经常使用,但这是第一批讨论这些攻击潜力的科学论文之一,攻击者可以通过这些攻击广泛地分析、控制和修改程序。通过最近提出的软件水印算法的案例研究来说明这些概念[6]。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Is DRM working?: how could we tell? Integrated circuit digital rights management techniques using physical level characterization Traitor tracing schemes for protected software implementations A domain specific language for usage management Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1