Polymorphic Attacks against Sequence-based Software Birthmarks
Hyoungshick Kim1, Wei Ming Khoo2, Pietro Liò2
1University of British Columbia, 2University of Cambridge
Software Security and Protection Workshop (SSP’12) 16 June 2012
Polymorphic Attacks against Sequence-based Software Birthmarks - - PowerPoint PPT Presentation
Polymorphic Attacks against Sequence-based Software Birthmarks Hyoungshick Kim 1 , Wei Ming Khoo 2 , Pietro Li 2 1 University of British Columbia, 2 University of Cambridge Software Security and Protection Workshop (SSP12) 16 June 2012
Hyoungshick Kim1, Wei Ming Khoo2, Pietro Liò2
1University of British Columbia, 2University of Cambridge
Software Security and Protection Workshop (SSP’12) 16 June 2012
Alice Bob Honest software vendor Evil software analyst
Gap
Match Mismatch
cmp-branch fn prologue imul
INS(R)
n – birthmark length m – number of unique symbols
Fak-DO Notepad Skyhoo triangle
Detection rate Similarity score
INS(N)
How about deletion?
Detection rate Similarity score
DEL(R) , xd = 2/6
DEL(H), xd = 2/6
Detection rate Similarity score
HYB(RR) = INS(R) + DEL(R) HYB(RN) = INS(N) + DEL(R) HYB(HR) = INS(R) + DEL(H) HYB(HN) = INS(N) + DEL(H) (Skyhoo)