Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism
Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocati...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Jones,Luke Blackthorne,Jeremy Whelan,Ryan Baker,Graham |
description | Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD1034702</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD1034702</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD10347023</originalsourceid><addsrcrecordid>eNqFjDEKwkAQRdNYiHoDi7mAEI0g2AVj0EIQ1DqsyawZ3OzGmYnB25vC3urDe48_jmzuQq_m7lC2cObwYNPA5YkO1Tg4-jeyUPBgA0OGFo1CsANX5JZDiVXHQ5d64z5CAj1pDTdPrw7hNFw0gduapJlGI2uc4Oy3k2ie76-7w6JSKgtR8qhFmi3jZL2JV8kf_QX_fjzF</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><source>DTIC Technical Reports</source><creator>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham</creator><creatorcontrib>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham ; MIT Lincoln Laboratory Lexington United States</creatorcontrib><description>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</description><language>eng</language><subject>algorithms ; computer programs ; Computer Systems Management and Standards ; cryptography ; flowtables(computer program) ; information security ; intellectual property ; obfuscation ; security protocols</subject><creationdate>2015</creationdate><rights>Approved For Public Release</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD1034702$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Jones,Luke</creatorcontrib><creatorcontrib>Blackthorne,Jeremy</creatorcontrib><creatorcontrib>Whelan,Ryan</creatorcontrib><creatorcontrib>Baker,Graham</creatorcontrib><creatorcontrib>MIT Lincoln Laboratory Lexington United States</creatorcontrib><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><description>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</description><subject>algorithms</subject><subject>computer programs</subject><subject>Computer Systems Management and Standards</subject><subject>cryptography</subject><subject>flowtables(computer program)</subject><subject>information security</subject><subject>intellectual property</subject><subject>obfuscation</subject><subject>security protocols</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNqFjDEKwkAQRdNYiHoDi7mAEI0g2AVj0EIQ1DqsyawZ3OzGmYnB25vC3urDe48_jmzuQq_m7lC2cObwYNPA5YkO1Tg4-jeyUPBgA0OGFo1CsANX5JZDiVXHQ5d64z5CAj1pDTdPrw7hNFw0gduapJlGI2uc4Oy3k2ie76-7w6JSKgtR8qhFmi3jZL2JV8kf_QX_fjzF</recordid><startdate>20150828</startdate><enddate>20150828</enddate><creator>Jones,Luke</creator><creator>Blackthorne,Jeremy</creator><creator>Whelan,Ryan</creator><creator>Baker,Graham</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20150828</creationdate><title>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</title><author>Jones,Luke ; Blackthorne,Jeremy ; Whelan,Ryan ; Baker,Graham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD10347023</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>algorithms</topic><topic>computer programs</topic><topic>Computer Systems Management and Standards</topic><topic>cryptography</topic><topic>flowtables(computer program)</topic><topic>information security</topic><topic>intellectual property</topic><topic>obfuscation</topic><topic>security protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Jones,Luke</creatorcontrib><creatorcontrib>Blackthorne,Jeremy</creatorcontrib><creatorcontrib>Whelan,Ryan</creatorcontrib><creatorcontrib>Baker,Graham</creatorcontrib><creatorcontrib>MIT Lincoln Laboratory Lexington United States</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jones,Luke</au><au>Blackthorne,Jeremy</au><au>Whelan,Ryan</au><au>Baker,Graham</au><aucorp>MIT Lincoln Laboratory Lexington United States</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism</btitle><date>2015-08-28</date><risdate>2015</risdate><abstract>Obfuscation, in the most general sense, is widely applicable to intellectual property protection, software tamper resistance and cryptographic algorithms. We have created Flow tables, a LLVM-based obfuscator which aims to protect intellectual property, hardening programs against analysis by relocating the edges of the call graph to a different process. This process temporarily and minimally supplies edges back to the original program only at runtime. We call this transformation program skeletal inversion, and by effectively removing the call graph from a program, we defeat any inter-procedural analyses. In addition, the newly externally malleable program skeleton enables unique metamorphism with the beneficial property of arbitrarily complex functionality transformation.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_AD1034702 |
source | DTIC Technical Reports |
subjects | algorithms computer programs Computer Systems Management and Standards cryptography flowtables(computer program) information security intellectual property obfuscation security protocols |
title | Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A03%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Flowtables:%20Program%20Skeletal%20Inversion%20for%20Defeat%20of%20Interprocedural%20Analysis%20with%20Unique%20Metamorphism&rft.au=Jones,Luke&rft.aucorp=MIT%20Lincoln%20Laboratory%20Lexington%20United%20States&rft.date=2015-08-28&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD1034702%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |