TY - GEN
T1 - Software protection through dynamic code mutation
AU - Madou, Matias
AU - Anckaert, Bertrand
AU - Moseley, Patrick
AU - Debray, Saumya
AU - De Sutter, Bjorn
AU - De Bosschere, Koen
PY - 2005
Y1 - 2005
N2 - Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.
AB - Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.
UR - http://www.scopus.com/inward/record.url?scp=33744935812&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33744935812&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33744935812
SN - 3540310126
SN - 9783540310129
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 194
EP - 206
BT - Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
T2 - 6th International Workshop on Information Security Applications, WISA 2005
Y2 - 22 August 2005 through 24 August 2005
ER -