A Formal Framework for Property-Driven Obfuscation Strategies

  • Mila Dalla Preda
  • Isabella Mastroeni
  • Roberto Giacobazzi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8070)

Abstract

We study the existence and the characterization of function transformers that minimally or maximally modify a function in order to reveal or conceal a certain property. Based on this general formal framework we develop a strategy for the design of the maximal obfuscating transformation that conceals a given property while revealing the desired observational behaviour.

Keywords

Program transformation abstract interpretation semantics code obfuscation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andéka, H., Greechie, R.J., Strecker, G.E.: On residuated approximations. In: Kreowski, H.-J., Herrlich, H., Preuß, G., Ehrig, H. (eds.) Categorical Methods in Computer Science. LNCS, vol. 393, pp. 333–339. Springer, Heidelberg (1989)Google Scholar
  2. 2.
    Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Collberg, C., Thomborson, C.D., Low, D.: Manufactoring cheap, resilient, and stealthy opaque constructs. In: ACM Symp. on Principles of Programming Languages (POPL 1998), pp. 184–196. ACM Press (1998)Google Scholar
  4. 4.
    Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: ACM Symp. on Principles of Programming Languages (POPL 1977), pp. 238–252. ACM Press (1977)Google Scholar
  5. 5.
    Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: ACM Symp. Principles of Programming Languages (POPL 1979), pp. 269–282. ACM Press (1979)Google Scholar
  6. 6.
    Cousot, P., Cousot, R.: Systematic design of program transformation frameworks by abstract interpretation. In: ACM Symp. on Principles of Programming Languages, pp. 178–190. ACM Press (2002)Google Scholar
  7. 7.
    Dalla Preda, M., Giacobazzi, R.: Control code obfuscation by abstract interpretation. In: Software Engineering and Formal Methods (SCAM 2005), pp. 301–310. IEEE Computer Society (2005)Google Scholar
  8. 8.
    Dalla Preda, M., Giacobazzi, R.: Semantics-based code obfuscation by abstract interpretation. Journal of Computer Security 17(6), 855–908 (2009)Google Scholar
  9. 9.
    Giacobazzi, R., Mastroeni, I.: Transforming abstract interpretations by abstract interpretation. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol. 5079, pp. 1–17. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  10. 10.
    Giacobazzi, R., Mastroeni, I.: Making abstract interpretation incomplete - modeling the potency of obfuscation. In: Miné, A., Schmidt, D. (eds.) SAS 2012. LNCS, vol. 7460, pp. 129–145. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Giacobazzi, R., Ranzato, F.: Uniform closures: order-theoretically reconstructing logic program semantics and abstract domain refinements. Inform. and Comput. 145(2), 153–190 (1998)MathSciNetMATHCrossRefGoogle Scholar
  12. 12.
    Giacobazzi, R., Ranzato, F., Scozzari, F.: Making abstract interpretation complete. Journal of the ACM 47(2), 361–416 (2000)MathSciNetMATHCrossRefGoogle Scholar
  13. 13.
    Gierz, G., Hofmann, K.H., Keimel, K., Lawson, J.D., Mislove, M., Scott, D.S.: A Compendium of Continuous Lattices. Springer (1980)Google Scholar
  14. 14.
    Janowitz, M.F.: Residuated closure operators. Portug. Math. 26(2), 221–252 (1967)MathSciNetMATHGoogle Scholar
  15. 15.
    Majumdar, A., Drape, S.J., Thomborson, C.D.: Slicing obfuscations: design, correctness, and evaluation. In: ACM Workshop on Digital Rights Management, pp. 70–81. ACM (2007)Google Scholar
  16. 16.
    Weiser, M.: Program slicing. In: ICSE 1981: Proceedings of the 5th International Conference on Software Engineering, pp. 439–449. IEEE Press (1981)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Mila Dalla Preda
    • 1
  • Isabella Mastroeni
    • 1
  • Roberto Giacobazzi
    • 1
  1. 1.University of VeronaItaly

Personalised recommendations