TY - GEN
T1 - Identifying and understanding self-checksumming defenses in software
AU - Qiu, Jing
AU - Yadegari, Babak
AU - Johannesmeyer, Brian
AU - Debray, Saumya
AU - Su, Xiaohong
N1 - Publisher Copyright:
Copyright © 2015 ACM.
PY - 2015/3/2
Y1 - 2015/3/2
N2 - Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.
AB - Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.
UR - http://www.scopus.com/inward/record.url?scp=84928140864&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84928140864&partnerID=8YFLogxK
U2 - 10.1145/2699026.2699109
DO - 10.1145/2699026.2699109
M3 - Conference contribution
AN - SCOPUS:84928140864
T3 - CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
SP - 207
EP - 218
BT - CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery
T2 - 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015
Y2 - 2 March 2015 through 4 March 2015
ER -