Identifying and understanding self-checksumming defenses in software

Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya K Debray, Xiaohong Su

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.

Original languageEnglish (US)
Title of host publicationCODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages207-218
Number of pages12
ISBN (Print)9781450331913
DOIs
StatePublished - Mar 2 2015
Event5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015 - San Antonio, United States
Duration: Mar 2 2015Mar 4 2015

Other

Other5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015
CountryUnited States
CitySan Antonio
Period3/2/153/4/15

Fingerprint

Intellectual property
Cables
Experiments

ASJC Scopus subject areas

  • Information Systems
  • Software
  • Computer Science Applications

Cite this

Qiu, J., Yadegari, B., Johannesmeyer, B., Debray, S. K., & Su, X. (2015). Identifying and understanding self-checksumming defenses in software. In CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (pp. 207-218). Association for Computing Machinery, Inc. https://doi.org/10.1145/2699026.2699109

Identifying and understanding self-checksumming defenses in software. / Qiu, Jing; Yadegari, Babak; Johannesmeyer, Brian; Debray, Saumya K; Su, Xiaohong.

CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, 2015. p. 207-218.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qiu, J, Yadegari, B, Johannesmeyer, B, Debray, SK & Su, X 2015, Identifying and understanding self-checksumming defenses in software. in CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, pp. 207-218, 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, United States, 3/2/15. https://doi.org/10.1145/2699026.2699109
Qiu J, Yadegari B, Johannesmeyer B, Debray SK, Su X. Identifying and understanding self-checksumming defenses in software. In CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc. 2015. p. 207-218 https://doi.org/10.1145/2699026.2699109
Qiu, Jing ; Yadegari, Babak ; Johannesmeyer, Brian ; Debray, Saumya K ; Su, Xiaohong. / Identifying and understanding self-checksumming defenses in software. CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, 2015. pp. 207-218
@inproceedings{b25ae0dce46749c8bd384dbfece06b19,
title = "Identifying and understanding self-checksumming defenses in software",
abstract = "Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.",
author = "Jing Qiu and Babak Yadegari and Brian Johannesmeyer and Debray, {Saumya K} and Xiaohong Su",
year = "2015",
month = "3",
day = "2",
doi = "10.1145/2699026.2699109",
language = "English (US)",
isbn = "9781450331913",
pages = "207--218",
booktitle = "CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy",
publisher = "Association for Computing Machinery, Inc",

}

TY - GEN

T1 - Identifying and understanding self-checksumming defenses in software

AU - Qiu, Jing

AU - Yadegari, Babak

AU - Johannesmeyer, Brian

AU - Debray, Saumya K

AU - Su, Xiaohong

PY - 2015/3/2

Y1 - 2015/3/2

N2 - Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.

AB - Software self-checksumming is widely used as an anti-tam- pering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self- checksumming. This paper describes a dynamic information- flow-based attack that aims to identify and understand self- checksumming behavior in software. Our approach is appli- cable to a wide class of self-chesumming defenses and the in- formation obtained can be used to determine how the check- summing defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our ap- proach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research lit- erature.

UR - http://www.scopus.com/inward/record.url?scp=84928140864&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84928140864&partnerID=8YFLogxK

U2 - 10.1145/2699026.2699109

DO - 10.1145/2699026.2699109

M3 - Conference contribution

AN - SCOPUS:84928140864

SN - 9781450331913

SP - 207

EP - 218

BT - CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy

PB - Association for Computing Machinery, Inc

ER -