On Manufacturing Resilient Opaque Constructs Against Static Analysis
نویسندگان
چکیده
Opaque constructs have developed into a commonly used primitive in obfuscation, watermarking, and tamper-proofing schemes. However, most prior work has based the resilience of these primitives on a poorly defined reduction to a known N P -complete problem. There has been little scrutiny of the adversarial model and little discussion of how to generate instances that are always hard. In this paper, we offer what we believe to be the first complete algorithm for generating resilient opaque constructs against static analysis. We base their resilience on the complexity of 3SAT instances with cn clauses for c = 6 and n distinct variables. We draw on existing theoretical bounds to show that these instances always require exponential time to defeat under formal notions of resolution complexity. This paper also explores in-depth the security of opaque constructs in realworld settings. We argue that the common theoretical model used in prior work (as well as our resilient opaque construction scheme) is too optimistic. It does not offer practical obfuscation against an adversary who tolerates some small false positive rate. We offer a heuristic-based attack to demonstrate this issue. Our results suggest that opaque constructs should be viewed with a high degree of skepticism until they can be proven secure under more useful theoretical models.
منابع مشابه
An ID-Based Watermarking Scheme for Java Programs
In this paper, we propose an identities(ID) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants’ identities, embedded via the watermarked opaque predicates, and verified using zero-knowledge proof. We also present a construction of a family of opaque predicates by Legendre symbol, which is resilient, cheap, and stealthy. The order of the waterm...
متن کاملManufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfuscation is to make the logic embedded in code incomprehensible to automated program analysis tools used by adversaries. Opaque predicates act as tool for obfuscating control flow logic embedded within code. In this posi...
متن کاملIR-reflective Opaque Water-based Acrylic Coatings on White Pine Wood Substrates
Two sets of opaque water-based acrylic coatings were prepared with IR-reflective pigments and conventional pigments. The objective of this work was to determine the efficiency of IR-reflective pigments in limiting the heat buildup of opaque coating formulations. Experiments performed on PVC substrates revealed that IR-reflective pigments significantly decreased the temperature increase above ro...
متن کاملSoftware watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal redistribution. In particular we analyze an algorithm originally proposed...
متن کاملNumerical Investigation on the Effect of Mold Design on Shrinkage of Sand Casted Multistage BB3-6×6 Pump Casing (RESEARCH NOTE)
Design and manufacturing technology of high pressure multistage pumps which are commonly utilized in oil and gas industries, used to be imported from foreign companies. Due to international sanctions against I. R. Iran, it started to be designed and launched domestically. Nowadays all production lines including design, manufacturing and testing of these pumps have been performed by Iranian expe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016