applying software obfuscation to malicious code n.
Skip this Video
Loading SlideShow in 5 Seconds..
Applying Software Obfuscation to Malicious Code PowerPoint Presentation
Download Presentation
Applying Software Obfuscation to Malicious Code

Applying Software Obfuscation to Malicious Code

121 Vues Download Presentation
Télécharger la présentation

Applying Software Obfuscation to Malicious Code

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Applying Software Obfuscation to Malicious Code Teigh Berg

  2. What Is Software Obfuscation? • Software obfuscation is a method that protects code from being reverse-engineered, while still making the code entirely executable. • Software obfuscation is used mostly in protection of code from IP theft and copying of code.

  3. New Method of Obfuscation • Previous methods of obfuscation are unable to completely protect code, as they can be reverse engineered in order to see the desired code. • A new method was recently developed by Amit Sahai of UCLA, which confronts those who would try to reverse engineer code with math problems that take over 100 years to solve by todays computing standards.

  4. Our Plan • What we currently plan to do is to repurpose Sahai’s method of obfuscation and apply that to malicious code. • We wish to do this so that we may enhance the cyber arsenal for law enforcement and alphabet agencies (CIA, FBI, NSA, DHS).

  5. Project Plan • Starting out, we will develop a virtual environment for our code, in order to be better prepared for any possible code leakage. • Following the development of our virtual environment, we will begin developing the repurposed code. Our aim is to make sure that our code is unable to be reverse engineered, in order to prevent a solution for a virus to be developed.

  6. Project Plan (cont.) • After we have developed the working code, we will move immediately to testing of the code on our virtual environment to gather data for our reports. • After we have finished gathering data, we intend to present our findings at conferences in our field (DEFCON)

  7. Questions? Comments?