Identifying and Understanding Self-Checksumming Defenses in Software

Jing Qiu,Babak Yadegari,Brian Johannesmeyer,Saumya Debray,Xiaohong Su
DOI: https://doi.org/10.1145/2699026.2699109
2015-01-01
Abstract:Software self-checksumming is widely used as an anti-tampering mechanism for protecting intellectual property and deterring piracy. This makes it important to understand the strengths and weaknesses of various approaches to self-checksumming. This paper describes a dynamic information-flow-based attack that aims to identify and understand self-checksumming behavior in software. Our approach is applicable to a wide class of self chesumming defenses and the information obtained can be used to determine how the checksumming defenses may be bypassed. Experiments using a prototype implementation of our ideas indicate that our approach can successfully identify self-checksumming behavior in (our implementations of) proposals from the research literature.
What problem does this paper attempt to address?