Exploiting Self-Modification Mechanism for Program Protection

Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken Ichi Matsumoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Citations (Scopus)

Abstract

In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.

Original languageEnglish
Title of host publicationProceedings - IEEE Computer Society's International Computer Software and Applications Conference
Pages170-179
Number of pages10
Publication statusPublished - 2003
Externally publishedYes
EventProceedings: 27th Annual International Computer Software and Applications Conference, COMPSAC 2003 - Dallas, TX, United States
Duration: Nov 3 2003Nov 6 2003

Other

OtherProceedings: 27th Annual International Computer Software and Applications Conference, COMPSAC 2003
CountryUnited States
CityDallas, TX
Period11/3/0311/6/03

Fingerprint

Hardware

ASJC Scopus subject areas

  • Software

Cite this

Kanzaki, Y., Monden, A., Nakamura, M., & Matsumoto, K. I. (2003). Exploiting Self-Modification Mechanism for Program Protection. In Proceedings - IEEE Computer Society's International Computer Software and Applications Conference (pp. 170-179)

Exploiting Self-Modification Mechanism for Program Protection. / Kanzaki, Yuichiro; Monden, Akito; Nakamura, Masahide; Matsumoto, Ken Ichi.

Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. 2003. p. 170-179.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kanzaki, Y, Monden, A, Nakamura, M & Matsumoto, KI 2003, Exploiting Self-Modification Mechanism for Program Protection. in Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. pp. 170-179, Proceedings: 27th Annual International Computer Software and Applications Conference, COMPSAC 2003, Dallas, TX, United States, 11/3/03.
Kanzaki Y, Monden A, Nakamura M, Matsumoto KI. Exploiting Self-Modification Mechanism for Program Protection. In Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. 2003. p. 170-179
Kanzaki, Yuichiro ; Monden, Akito ; Nakamura, Masahide ; Matsumoto, Ken Ichi. / Exploiting Self-Modification Mechanism for Program Protection. Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. 2003. pp. 170-179
@inproceedings{4787f66ba3e6421bab0e7f5be3422a9d,
title = "Exploiting Self-Modification Mechanism for Program Protection",
abstract = "In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.",
author = "Yuichiro Kanzaki and Akito Monden and Masahide Nakamura and Matsumoto, {Ken Ichi}",
year = "2003",
language = "English",
pages = "170--179",
booktitle = "Proceedings - IEEE Computer Society's International Computer Software and Applications Conference",

}

TY - GEN

T1 - Exploiting Self-Modification Mechanism for Program Protection

AU - Kanzaki, Yuichiro

AU - Monden, Akito

AU - Nakamura, Masahide

AU - Matsumoto, Ken Ichi

PY - 2003

Y1 - 2003

N2 - In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.

AB - In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.

UR - http://www.scopus.com/inward/record.url?scp=0345529075&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0345529075&partnerID=8YFLogxK

M3 - Conference contribution

SP - 170

EP - 179

BT - Proceedings - IEEE Computer Society's International Computer Software and Applications Conference

ER -