TY - GEN
T1 - Deobfuscation reverse engineering obfuscated code
AU - Udupa, Sharath K.
AU - Debray, Saumya K.
AU - Madou, Matias
PY - 2005
Y1 - 2005
N2 - In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our results indicate that much of the effects of code obfuscation, designed to increase the difficulty of static analyses, can be defeated using simple combinations of straightforward static and dynamic analyses, Our results have applications to both software engineering and software security. In the context of software engineering, we show how dynamic analyses can be used to enhance reverse engineering, even for code that has been designed to be difficult to reverse engineer. For software security, our results serve as an attack model for code obfuscators, and can help with the development of obfuscation techniques that are more resilient to straightforward reverse engineering.
AB - In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our results indicate that much of the effects of code obfuscation, designed to increase the difficulty of static analyses, can be defeated using simple combinations of straightforward static and dynamic analyses, Our results have applications to both software engineering and software security. In the context of software engineering, we show how dynamic analyses can be used to enhance reverse engineering, even for code that has been designed to be difficult to reverse engineer. For software security, our results serve as an attack model for code obfuscators, and can help with the development of obfuscation techniques that are more resilient to straightforward reverse engineering.
UR - http://www.scopus.com/inward/record.url?scp=33846192387&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33846192387&partnerID=8YFLogxK
U2 - 10.1109/WCRE.2005.13
DO - 10.1109/WCRE.2005.13
M3 - Conference contribution
AN - SCOPUS:33846192387
SN - 0769524745
SN - 9780769524740
T3 - Proceedings - Working Conference on Reverse Engineering, WCRE
SP - 45
EP - 56
BT - WCRE
T2 - WCRE: 12th Working Conference on Reverse Engineering 2005
Y2 - 7 November 2005 through 11 November 2005
ER -