Home > Research > Publications & Outputs > Exploit Dynamic Data Flows to Protect Software ...

Electronic data

  • UIC_2017_paper_80

    Accepted author manuscript, 591 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. / Kuang, Kaiyuan; Tang, Zhanyong; Gong, Xiaoqing et al.
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2017.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Kuang, K, Tang, Z, Gong, X, Fang, D, Chen, X, Zhang, H & Wang, Z 2017, Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. in 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE. https://doi.org/10.1109/UIC-ATC.2017.8397540

APA

Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H., & Wang, Z. (2017). Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) IEEE. https://doi.org/10.1109/UIC-ATC.2017.8397540

Vancouver

Kuang K, Tang Z, Gong X, Fang D, Chen X, Zhang H et al. Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE. 2017 doi: 10.1109/UIC-ATC.2017.8397540

Author

Kuang, Kaiyuan ; Tang, Zhanyong ; Gong, Xiaoqing et al. / Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2017.

Bibtex

@inproceedings{ac3bb89feb5f484497f626dffec49fe7,
title = "Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks",
abstract = "Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine based code obfuscation is emerging as a powerful technique for software protection. However, the current Virtual machine code protection are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program to construct a simpler program that is functionally equivalent to the obfuscated program but easier to analyze. This paper presents DSA-VMP, a novel VM-based code obfuscation technique, to address the issue of semantic attacks. Our design goal is to exploit dynamic data flows to increase the diversity of the program behaviour. Our approach uses multiple bytecode handlers to interpret a single bytecode and hides the logics that determine the program execution path (it is difficult for the attacker to anticipate the program execution flow). These two techniques greatly increase the diversity of the program execution where the protected code regions exhibit a complex data flow across multiple runs, making it harder and more time consuming to trace the program execution through profiling. Our approach is evaluated using a set of real-world applications. Experimental results show that DSA-VMP can well protect software against semantic attacks at the cost of little extra runtime overhead when compared to two commercial VM-based code obfuscation tools.",
author = "Kaiyuan Kuang and Zhanyong Tang and Xiaoqing Gong and Dingyi Fang and Xiaojiang Chen and Heng Zhang and Zheng Wang",
year = "2017",
month = aug,
day = "8",
doi = "10.1109/UIC-ATC.2017.8397540",
language = "English",
booktitle = "2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

AU - Kuang, Kaiyuan

AU - Tang, Zhanyong

AU - Gong, Xiaoqing

AU - Fang, Dingyi

AU - Chen, Xiaojiang

AU - Zhang, Heng

AU - Wang, Zheng

PY - 2017/8/8

Y1 - 2017/8/8

N2 - Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine based code obfuscation is emerging as a powerful technique for software protection. However, the current Virtual machine code protection are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program to construct a simpler program that is functionally equivalent to the obfuscated program but easier to analyze. This paper presents DSA-VMP, a novel VM-based code obfuscation technique, to address the issue of semantic attacks. Our design goal is to exploit dynamic data flows to increase the diversity of the program behaviour. Our approach uses multiple bytecode handlers to interpret a single bytecode and hides the logics that determine the program execution path (it is difficult for the attacker to anticipate the program execution flow). These two techniques greatly increase the diversity of the program execution where the protected code regions exhibit a complex data flow across multiple runs, making it harder and more time consuming to trace the program execution through profiling. Our approach is evaluated using a set of real-world applications. Experimental results show that DSA-VMP can well protect software against semantic attacks at the cost of little extra runtime overhead when compared to two commercial VM-based code obfuscation tools.

AB - Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine based code obfuscation is emerging as a powerful technique for software protection. However, the current Virtual machine code protection are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program to construct a simpler program that is functionally equivalent to the obfuscated program but easier to analyze. This paper presents DSA-VMP, a novel VM-based code obfuscation technique, to address the issue of semantic attacks. Our design goal is to exploit dynamic data flows to increase the diversity of the program behaviour. Our approach uses multiple bytecode handlers to interpret a single bytecode and hides the logics that determine the program execution path (it is difficult for the attacker to anticipate the program execution flow). These two techniques greatly increase the diversity of the program execution where the protected code regions exhibit a complex data flow across multiple runs, making it harder and more time consuming to trace the program execution through profiling. Our approach is evaluated using a set of real-world applications. Experimental results show that DSA-VMP can well protect software against semantic attacks at the cost of little extra runtime overhead when compared to two commercial VM-based code obfuscation tools.

U2 - 10.1109/UIC-ATC.2017.8397540

DO - 10.1109/UIC-ATC.2017.8397540

M3 - Conference contribution/Paper

BT - 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)

PB - IEEE

ER -