首页> 外文期刊>International Journal of Information Security >Replacement attacks: automatically evading behavior-based software birthmark
【24h】

Replacement attacks: automatically evading behavior-based software birthmark

机译:替换攻击:自动规避基于行为的软件胎记

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Software birthmarks utilize certain specific program characteristics to validate the origin of software, so it can be applied to detect software piracy. One state-of-the-art technology on software birthmark adopts dynamic system call dependence graphs as the unique signature of a program, which cannot be cluttered by existing obfuscation techniques and is also immune to the no-ops system call insertion attack. In this paper, we analyze its weaknesses and construct replacement attacks with the help of semantics equivalent system calls to unlock the high frequency dependencies between the system calls in the victim’s original system call dependence graph. Our results show that the proposed replacement attacks can destroy the original birthmark successfully.
机译:软件胎记利用某些特定的程序特征来验证软件的来源,因此可以将其应用于检测软件盗版。一种关于软件胎记的最先进技术采用动态系统调用依赖图作为程序的唯一签名,它不能被现有的混淆技术所弄乱,而且还不受no-ops系统调用插入攻击的影响。在本文中,我们分析了它的弱点,并在语义等效的系统调用的帮助下构造了替换攻击,以释放受害者原始系统调用相关性图中系统调用之间的高频依赖性。我们的结果表明,提出的替换攻击可以成功地破坏原始胎记。

著录项

  • 来源
    《International Journal of Information Security》 |2012年第5期|p.293-304|共12页
  • 作者单位

    State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China;

    State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China;

    State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China;

    College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA;

    College of Information Science and Technology, The Pennsylvania State University, University Park, PA, USA;

    State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, 210093, China;

    State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing Univers;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Software birthmark; Replacement attack; System call; Dependency graph;

    机译:软件胎记;替换攻击;系统调用;依赖图;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号