VirtSC: Combining Virtualization Obfuscation with Self-Checksumming

09/25/2019
by   Mohsen Ahmadvand, et al.
0

Self-checksumming (SC) is a tamper-proofing technique that ensures certain program segments (code) in memory hash to known values at runtime. SC has few restrictions on application and hence can protect a vast majority of programs. The code verification in SC requires computation of the expected hashes after compilation, as the machine-code is not known before. This means the expected hash values need to be adjusted in the binary executable, hence combining SC with other protections is limited due to this adjustment step. However, obfuscation protections are often necessary, as SC protections can be otherwise easily detected and disabled via pattern matching. In this paper, we present a layered protection using virtualization obfuscation, yielding an architecture-agnostic SC protection that requires no post-compilation adjustment. We evaluate the performance of our scheme using a dataset of 25 real-world programs (MiBench and 3 CLI games). Our results show that the SC scheme induces an average overhead of 43 coverage). The overhead is tolerable for less CPU-intensive programs (e.g. games) and when only parts of programs (e.g. license checking) are protected. However, large overheads stemming from the virtualization obfuscation were encountered.

READ FULL TEXT
research
06/24/2022

SC-Ques: A Sentence Completion Question Dataset for English as a Second Language Learners

Sentence completion (SC) questions present a sentence with one or more b...
research
09/13/2018

Multi-Dimensional Spatially-Coupled Code Design Through Informed Relocation of Circulants

A circulant-based spatially-coupled (SC) code is constructed by partitio...
research
01/21/2019

SC-Fano Decoding of Polar Codes

In this paper, we present a novel decoding algorithm of a polar code, na...
research
04/14/2018

Reasoning About TSO Programs Using Reduction and Abstraction

We present a method for proving that a program running under the Total S...
research
06/23/2021

MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation

Secure Computation (SC) is a family of cryptographic primitives for comp...
research
09/15/2015

Self-Configuring and Evolving Fuzzy Image Thresholding

Every segmentation algorithm has parameters that need to be adjusted in ...
research
03/06/2023

SC-Block: Supervised Contrastive Blocking within Entity Resolution Pipelines

The goal of entity resolution is to identify records in multiple dataset...

Please sign up or login with your details

Forgot password? Click here to reset