Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism

Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jones,Luke, Blackthorne,Jeremy, Whelan,Ryan, Baker,Graham
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Jones,Luke
Blackthorne,Jeremy
Whelan,Ryan
Baker,Graham
description Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD1034702</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD1034702</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD10347023</originalsourceid><addsrcrecordid>eNqFjDEKwkAQRdNYiHoDi7mAEI0g2AVj0EIQ1DqsyawZ3OzGmYnB25vC3urDe48_jmzuQq_m7lC2cObwYNPA5YkO1Tg4-jeyUPBgA0OGFo1CsANX5JZDiVXHQ5d64z5CAj1pDTdPrw7hNFw0gduapJlGI2uc4Oy3k2ie76-7w6JSKgtR8qhFmi3jZL2JV8kf_QX_fjzF</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><source>DTIC Technical Reports</source><creator>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham</creator><creatorcontrib>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham ; MIT Lincoln Laboratory Lexington United States</creatorcontrib><description>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</description><language>eng</language><subject>algorithms ; computer programs ; Computer Systems Management and Standards ; cryptography ; flowtables(computer program) ; information security ; intellectual property ; obfuscation ; security protocols</subject><creationdate>2015</creationdate><rights>Approved For Public Release</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD1034702$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Jones,Luke</creatorcontrib><creatorcontrib>Blackthorne,Jeremy</creatorcontrib><creatorcontrib>Whelan,Ryan</creatorcontrib><creatorcontrib>Baker,Graham</creatorcontrib><creatorcontrib>MIT Lincoln Laboratory Lexington United States</creatorcontrib><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><description>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</description><subject>algorithms</subject><subject>computer programs</subject><subject>Computer Systems Management and Standards</subject><subject>cryptography</subject><subject>flowtables(computer program)</subject><subject>information security</subject><subject>intellectual property</subject><subject>obfuscation</subject><subject>security protocols</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNqFjDEKwkAQRdNYiHoDi7mAEI0g2AVj0EIQ1DqsyawZ3OzGmYnB25vC3urDe48_jmzuQq_m7lC2cObwYNPA5YkO1Tg4-jeyUPBgA0OGFo1CsANX5JZDiVXHQ5d64z5CAj1pDTdPrw7hNFw0gduapJlGI2uc4Oy3k2ie76-7w6JSKgtR8qhFmi3jZL2JV8kf_QX_fjzF</recordid><startdate>20150828</startdate><enddate>20150828</enddate><creator>Jones,Luke</creator><creator>Blackthorne,Jeremy</creator><creator>Whelan,Ryan</creator><creator>Baker,Graham</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20150828</creationdate><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><author>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD10347023</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>algorithms</topic><topic>computer programs</topic><topic>Computer Systems Management and Standards</topic><topic>cryptography</topic><topic>flowtables(computer program)</topic><topic>information security</topic><topic>intellectual property</topic><topic>obfuscation</topic><topic>security protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Jones,Luke</creatorcontrib><creatorcontrib>Blackthorne,Jeremy</creatorcontrib><creatorcontrib>Whelan,Ryan</creatorcontrib><creatorcontrib>Baker,Graham</creatorcontrib><creatorcontrib>MIT Lincoln Laboratory Lexington United States</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jones,Luke</au><au>Blackthorne,Jeremy</au><au>Whelan,Ryan</au><au>Baker,Graham</au><aucorp>MIT Lincoln Laboratory Lexington United States</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</btitle><date>2015-08-28</date><risdate>2015</risdate><abstract>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_AD1034702
source DTIC Technical Reports
subjects algorithms
computer programs
Computer Systems Management and Standards
cryptography
flowtables(computer program)
information security
intellectual property
obfuscation
security protocols
title Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A03%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Flowtables:%20Program%20Skeletal%20Inversion%20for%20Defeat%20of%20Interprocedural%20Analysis%20with%20Unique%20Metamorphism&rft.au=Jones,Luke&rft.aucorp=MIT%20Lincoln%20Laboratory%20Lexington%20United%20States&rft.date=2015-08-28&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD1034702%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true