Resilient self-debugging software protection
Autor: | Bart Coppens, Ilja Nevolin, Bert Abrath, Bjorn De Sutter |
---|---|
Předmět: |
Reverse engineering
FOS: Computer and information sciences Program testing Technology and Engineering Computer Science - Cryptography and Security Computer science media_common.quotation_subject Control (management) 02 engineering and technology computer.software_genre Software_SOFTWAREENGINEERING 0202 electrical engineering electronic engineering information engineering anti-debugging software protection media_common self-debugging business.industry Software protection 020207 software engineering reverse engineering Debugging Control system Software engineering business computer Cryptography and Security (cs.CR) Reciprocal anti-tampering |
Zdroj: | Ghent University Academic Bibliography 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) EuroS&P Workshops |
Popis: | Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however. We therefore improved upon the existing technique, making it more resilient by introducing reciprocal debugging and making the transfers of control between protected application and self-debugger more stealthy. This paper presents the improved self-debugging design, and details our research efforts into realizing reciprocal debugging. In our evaluation we show that the improved design is significantly harder for attackers to defeat. 10 pages, 2 figures |
Databáze: | OpenAIRE |
Externí odkaz: |