메뉴 건너뛰기




Volumn , Issue , 2009, Pages 391-400

Control flow obfuscation with information flow tracking

Author keywords

Control flow obfuscation; Control speculation; Information flow tracking; Opaque predicate

Indexed keywords

ARCHITECTURAL RESEARCH; ARCHITECTURAL SUPPORT; CODE SIZE; COMMON FEATURES; CONTROL FLOW OBFUSCATION; CONTROL FLOWS; HARDWARE SUPPORTS; INFORMATION FLOWS; ITANIUM PROCESSOR; MALICIOUS CODES; MALWARES; NORMAL CONTROLS; PERFORMANCE DEGRADATION; SECURE SOFTWARE;

EID: 76749151451     PISSN: 10724451     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1669112.1669162     Document Type: Conference Paper
Times cited : (40)

References (30)
  • 1
    • 52649112833 scopus 로고    scopus 로고
    • From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
    • H. Chen, X. Wu, L. Yuan, B. Zang, P. Yew, and F. Chong. From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware. In Proc. ISCA, pages 401-412, 2008.
    • (2008) Proc. ISCA , pp. 401-412
    • Chen, H.1    Wu, X.2    Yuan, L.3    Zang, B.4    Yew, P.5    Chong, F.6
  • 3
    • 84947229190 scopus 로고    scopus 로고
    • An approach to the obfuscation of control-flow of sequential computer programs
    • S. Chow, Y. Gu, H. Johnson, and V. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In Proc. Information Security Conference, pages 144-155, 2001.
    • (2001) Proc. Information Security Conference , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.4
  • 6
    • 0031649930 scopus 로고    scopus 로고
    • Manufacturing cheap, resilient, and stealthy opaque constructs
    • C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. POPL, pages 184-196, 1998.
    • (1998) Proc. POPL , pp. 184-196
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 7
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control Data Attack Prevention Orthogonal to Memory Model
    • J. Crandall and F. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. In Proc. Micro, pages 221-232, 2004.
    • (2004) Proc. Micro , pp. 221-232
    • Crandall, J.1    Chong, F.2
  • 8
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol reverse engineering from network traces
    • W. Cui, J. Kannan, and H. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In 16th Usenix Security Symposium, 2007.
    • (2007) 16th Usenix Security Symposium
    • Cui, W.1    Kannan, J.2    Wang, H.3
  • 9
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: a flexible information flow architecture for software security. In Proc. ISCA, pages 482-493, 2007.
    • (2007) Proc. ISCA , pp. 482-493
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 10
    • 76749129255 scopus 로고    scopus 로고
    • datarescue. IDA Pro. http://www.datarescue.com/idabase/.
    • datarescue. IDA Pro. http://www.datarescue.com/idabase/.
  • 12
    • 33745828710 scopus 로고    scopus 로고
    • Control flow based obfuscation
    • J. Ge, S. Chaudhuri, and A. Tyagi. Control flow based obfuscation. In Proc. DRM, pages 83-92, 2005.
    • (2005) Proc. DRM , pp. 83-92
    • Ge, J.1    Chaudhuri, S.2    Tyagi, A.3
  • 16
    • 52649153312 scopus 로고    scopus 로고
    • Coverage Maximization Using Dynamic Taint Tracing
    • Technical Report 112, MIT Lincoln Laboratory
    • T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage Maximization Using Dynamic Taint Tracing. Technical Report 112, MIT Lincoln Laboratory, 2007.
    • (2007)
    • Leek, T.1    Baker, G.2    Brown, R.3    Zhivich, M.4    Lippmann, R.5
  • 17
    • 76749158277 scopus 로고    scopus 로고
    • R. Lemos. Tracking code red. http://news.cnet.com/2009-1001-270471.html, visited May, 2009, 2001.
    • R. Lemos. Tracking code red. http://news.cnet.com/2009-1001-270471.html, visited May, 2009, 2001.
  • 18
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of executable code to improve resistance to static disassembly
    • C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In Proc. CCS, pages 290-299, 2003.
    • (2003) Proc. CCS , pp. 290-299
    • Linn, C.1    Debray, S.2
  • 19
    • 58049162000 scopus 로고    scopus 로고
    • Slicing obfuscations: Design, correctness, and evaluation
    • A. Majumdar, S. Drape, and C. Thomborson. Slicing obfuscations: design, correctness, and evaluation. In Proc. DRM, pages 70-81, 2007.
    • (2007) Proc. DRM , pp. 70-81
    • Majumdar, A.1    Drape, S.2    Thomborson, C.3
  • 20
    • 33645758539 scopus 로고    scopus 로고
    • Software watermarking via opaque predicates: Implementation, analysis, and attacks
    • G. Myles and C. Collberg. Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electronic Commerce Research, 6(2):155-171, 2006.
    • (2006) Electronic Commerce Research , vol.6 , Issue.2 , pp. 155-171
    • Myles, G.1    Collberg, C.2
  • 21
    • 77957774202 scopus 로고    scopus 로고
    • Understanding and visualizing full systems with data flow tomography
    • S. Mysore, B. Mazloom, B. Agrawal, and T. Sherwood. Understanding and visualizing full systems with data flow tomography. In Proc. ASPLOS, pages 211-221, 2008.
    • (2008) Proc. ASPLOS , pp. 211-221
    • Mysore, S.1    Mazloom, B.2    Agrawal, B.3    Sherwood, T.4
  • 25
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. ASPLOS, pages 85-96, 2004.
    • (2004) Proc. ASPLOS , pp. 85-96
    • Suh, G.1    Lee, J.2    Zhang, D.3    Devadas, S.4
  • 27
    • 52649133112 scopus 로고    scopus 로고
    • FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation
    • G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation. In Proc. HPCA, 2008.
    • (2008) Proc. HPCA
    • Venkataramani, G.1    Doudalis, I.2    Solihin, Y.3    Prvulovic, M.4
  • 28
    • 0035789216 scopus 로고    scopus 로고
    • Protection of software-based survivability mechanisms
    • C. Wang, J. Davidson, J. Hill, and J. Knight. Protection of software-based survivability mechanisms. In Proc. DSN, 2001.
    • (2001) Proc. DSN
    • Wang, C.1    Davidson, J.2    Hill, J.3    Knight, J.4
  • 29
    • 85050273691 scopus 로고
    • Program slicing
    • M. Weiser. Program slicing. In Proc. ICSE, pages 439-449, 1981.
    • (1981) Proc. ICSE , pp. 439-449
    • Weiser, M.1
  • 30
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proc. CCS, pages 138-147, 2002.
    • (2002) Proc. CCS , pp. 138-147
    • Zou, C.1    Gong, W.2    Towsley, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.