usenix conference policies
Binary Obfuscation Using Signals
Reverse engineering of software is the process of recovering higher-level structure and meaning from a lowerlevel program representation. It can be used for legitimate purposes — e.g., to recover source code that has been lost — but it is often used for nefarious purposes, e.g., to search for security vulnerabilities in binaries or to steal intellectual property. This paper addresses the problem of making it hard to reverse engineering binary programs bymaking it difficult to disassemblemachine code statically. Binaries are obfuscated by changing many control transfers into signals (traps) and inserting dummy control transfers and “junk” instructions after the signals. The resulting code is still a correct program, but even the best current disassemblers are unable to disassemble 40%–60% of the instructions in the program. Furthermore, the disassemblers have a mistaken understanding of over half of the control flow edges. However, the obfuscated program necessarily executes more slowly than the original. Experimental results quantify the degree of obfuscation, stealth of the code, and effects on execution time and code size.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Igor V. Popov and Saumya K. Debray and Gregory R. Andrews},
title = {Binary Obfuscation Using Signals},
booktitle = {16th USENIX Security Symposium (USENIX Security 07)},
year = {2007},
address = {Boston, MA },
url = {https://www.usenix.org/conference/16th-usenix-security-symposium/binary-obfuscation-using-signals},
publisher = {USENIX Association},
month = aug
}
connect with us