首页> 外文期刊>Empirical Software Engineering >Empirical assessment of the effort needed to attack programs protected with client/server code splitting
【24h】

Empirical assessment of the effort needed to attack programs protected with client/server code splitting

机译:对攻击受客户端/服务器代码分割保护的程序所需的工作量的经验评估

获取原文
获取原文并翻译 | 示例
           

摘要

Context Code hardening is meant to fight malicious tampering with sensitive code executed on client hosts. Code splitting is a hardening technique that moves selected chunks of code from client to server. Although widely adopted, the effective benefits of code splitting are not fully understood and thoroughly assessed. Objective The objective of this work is to compare non protected code vs. code splitting protected code, considering two levels of the chunk size parameter, in order to assess the effectiveness of the protection - in terms of both attack time and success rate - and to understand the attack strategy and process used to overcome the protection. Method We conducted an experiment with master students performing attack tasks on a small application hardened with different levels of protection. Students carried out their task working at the source code level. Results We observed a statistically significant effect of code splitting on the attack success rate that, on the average, was reduced from 89% with unprotected clear code to 52% with the most effective protection. The protection variant that moved some small-sized code chunks turned out to be more effective than the alternative moving fewer but larger chunks. Different strategies were identified yielding different success rates. Moreover we discovered that successful attacks exhibited different process w.r.t. failed ones. Conclusions We found empirical evidence of the effect of code splitting, assessed the relative magnitude, and evaluated the influence of the chunk size parameter. Moreover we extracted the process used to overcome such obfuscation technique.
机译:上下文代码强化旨在与对客户端主机上执行的敏感代码的恶意篡改作斗争。代码拆分是一种强化技术,可将选定的代码块从客户端移动到服务器。尽管广泛采用了代码拆分的有效好处,但尚未完全了解和评估。目的这项工作的目的是在考虑两个级别的块大小参数的情况下,比较非受保护的代码与代码拆分受保护的代码,以便从攻击时间和成功率两方面评估保护的有效性,并了解用于克服保护措施的攻击策略和过程。方法我们进行了一项实验,让硕士研究生在具有不同防护等级的小型应用程序上执行攻击任务。学生们在源代码级别执行任务。结果我们观察到了代码拆分对攻击成功率的统计学显着影响,平均而言,代码拆分率从无保护清晰代码的89%降低到最有效保护级别的52%。事实证明,移动一些较小代码块的保护变体比移动较少但较大的块的替代方法更有效。确定了不同的策略,产生了不同的成功率。此外,我们发现成功的攻击表现出不同的过程。失败的。结论我们找到了代码拆分效果的经验证据,评估了相对大小,并评估了块大小参数的影响。此外,我们提取了用于克服这种混淆技术的过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号