TY - GEN
T1 - Replacement attacks on behavior based software birthmark
AU - Xin, Zhi
AU - Chen, Huiyu
AU - Wang, Xinche
AU - Liu, Peng
AU - Zhu, Sencun
AU - Mao, Bing
AU - Xie, Li
PY - 2011
Y1 - 2011
N2 - Software birthmarks utilize certain specific program characteristics to validate the origin of software, so it can be applied to detect software piracy. One state-of-the-art technology on software birthmark adopts dynamic system call dependence graphs as the unique signature of a program, which cannot be cluttered by existing obfuscation techniques and is also immune to the no-ops system call insertion attack. In this paper, we analyze its weaknesses and construct replacement attacks with the help of semantics-equivalent system calls to unlock the high frequent dependency between the system calls in an original system call dependence graph. Our results show that the proposed replacement attacks can destroy the original birthmark successfully.
AB - Software birthmarks utilize certain specific program characteristics to validate the origin of software, so it can be applied to detect software piracy. One state-of-the-art technology on software birthmark adopts dynamic system call dependence graphs as the unique signature of a program, which cannot be cluttered by existing obfuscation techniques and is also immune to the no-ops system call insertion attack. In this paper, we analyze its weaknesses and construct replacement attacks with the help of semantics-equivalent system calls to unlock the high frequent dependency between the system calls in an original system call dependence graph. Our results show that the proposed replacement attacks can destroy the original birthmark successfully.
UR - http://www.scopus.com/inward/record.url?scp=80054810318&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054810318&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24861-0_1
DO - 10.1007/978-3-642-24861-0_1
M3 - Conference contribution
AN - SCOPUS:80054810318
SN - 9783642248603
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 16
BT - Information Security - 14th International Conference, ISC 2011, Proceedings
T2 - 14th International Conference on Information Security, ISC 2011
Y2 - 26 October 2011 through 29 October 2011
ER -