We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: CodeTrolley: Hardware-Assisted Control Flow Obfuscation

Abstract: Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which segments are added in to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation technique that deobfuscates code at runtime based on a secret safely stored in hardware, along with an LLVM compiler extension for obfuscating binaries. Unlike conventional tools, our work does not rely on compiling hard-to-reverse-engineer code, but on securing a secret key. As such, it can be seen as a lightweight alternative to on-the-fly binary decryption.
Comments: 2019 Boston Area Architecture Workshop (BARC'19)
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:1903.00841 [cs.CR]
  (or arXiv:1903.00841v3 [cs.CR] for this version)

Submission history

From: Michel Kinsy [view email]
[v1] Sun, 3 Mar 2019 06:21:24 GMT (460kb)
[v2] Sat, 9 Mar 2019 12:44:28 GMT (510kb,D)
[v3] Tue, 27 Aug 2019 03:18:42 GMT (370kb,D)

Link back to: arXiv, form interface, contact.