Presentation | 2002/12/9 Protecting Software Programs by Replacing Instructions at Run-time Yuichiro KANZAKI, Akito MONDEN, Masahide NAKAMURA, Ken-ichi MATSUMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original binary program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously retrieves the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Software Protection / Program Obfuscation / Self-modifying Code |
Paper # | ISEC2002-98 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2002/12/9(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Protecting Software Programs by Replacing Instructions at Run-time |
Sub Title (in English) | |
Keyword(1) | Software Protection |
Keyword(2) | Program Obfuscation |
Keyword(3) | Self-modifying Code |
1st Author's Name | Yuichiro KANZAKI |
1st Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology() |
2nd Author's Name | Akito MONDEN |
2nd Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology |
3rd Author's Name | Masahide NAKAMURA |
3rd Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology |
4th Author's Name | Ken-ichi MATSUMOTO |
4th Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology |
Date | 2002/12/9 |
Paper # | ISEC2002-98 |
Volume (vol) | vol.102 |
Number (no) | 511 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |