1 / 7

Applying Software Obfuscation to Malicious Code

Applying Software Obfuscation to Malicious Code. Teigh Berg. What Is Software Obfuscation?. Software obfuscation is a method that protects code from being reverse-engineered, while still making the code entirely executable.

keenan
Télécharger la présentation

Applying Software Obfuscation to Malicious Code

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Applying Software Obfuscation to Malicious Code Teigh Berg

  2. What Is Software Obfuscation? • Software obfuscation is a method that protects code from being reverse-engineered, while still making the code entirely executable. • Software obfuscation is used mostly in protection of code from IP theft and copying of code.

  3. New Method of Obfuscation • Previous methods of obfuscation are unable to completely protect code, as they can be reverse engineered in order to see the desired code. • A new method was recently developed by Amit Sahai of UCLA, which confronts those who would try to reverse engineer code with math problems that take over 100 years to solve by todays computing standards.

  4. Our Plan • What we currently plan to do is to repurpose Sahai’s method of obfuscation and apply that to malicious code. • We wish to do this so that we may enhance the cyber arsenal for law enforcement and alphabet agencies (CIA, FBI, NSA, DHS).

  5. Project Plan • Starting out, we will develop a virtual environment for our code, in order to be better prepared for any possible code leakage. • Following the development of our virtual environment, we will begin developing the repurposed code. Our aim is to make sure that our code is unable to be reverse engineered, in order to prevent a solution for a virus to be developed.

  6. Project Plan (cont.) • After we have developed the working code, we will move immediately to testing of the code on our virtual environment to gather data for our reports. • After we have finished gathering data, we intend to present our findings at conferences in our field (DEFCON)

  7. Questions? Comments?

More Related