Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Combating control flow linearization

 
: Kirsch, J.; Jonischkeit, C.; Kittel, T.; Zarras, A.; Eckert, C.

:

De Capitani di Vimercati, Sabrina ; International Federation for Information Processing -IFIP-, Technical Committee Security and Privacy Protection in Information Processing Systems:
ICT systems security and privacy protection. 32nd IFIP TC 11 International Conference, SEC 2017 : Rome, Italy, May 29-31, 2017; Proceedings
Cham: Springer International Publishing, 2017 (IFIP advances in information and communication technology 502)
ISBN: 978-3-319-58468-3 (Print)
ISBN: 978-3-319-58469-0 (Online)
ISBN: 3-319-58468-5
S.385-398
International Conference on ICT Systems Security and Privacy Protection (SEC) <32, 2017, Rome>
Englisch
Konferenzbeitrag
Fraunhofer AISEC ()

Abstract
Piracy is a persistent headache for software companies that try to protect their assets by investing both time and money. Program code obfuscation as a sub-field of software protection is a mechanism widely used toward this direction. However, effectively protecting a program against reverse-engineering and tampering turned out to be a highly non-trivial task that still is subject to ongoing research. Recently, a novel obfuscation technique called Control Flow Linearization (CFL) is gaining ground. While existing approaches try to complicate analysis by artificially increasing the control flow of a protected program, CFL takes the exact opposite direction: instead of increasing the complexity of the corresponding Control Flow Graph (CFG), the discussed obfuscation technique decreases the amount of nodes and edges in the CFG. In an extreme case, this means that the obfuscated program degenerates to one singular basic block, while still preserving its original semantics. In this paper, we present the DeMovfuscator, a system that is able to accurately break CFL obfuscation. DeMovfuscator can reconstruct the control flow, making only marginal assumptions about the execution environment of the obfuscated code. We evaluate both the performance and size overhead of CFL as well as the feasibility of our approach to deobfuscation. Overall, we show that even though CFL sounds like an ideal solution that can evade the state of the art deobfuscation approaches, it comes with its own limitations.

: http://publica.fraunhofer.de/dokumente/N-502421.html