Loki: Hardening Code Obfuscation Against Automated Attacks

AI-generated keywords: Software obfuscation

AI-generated Key Points

  • Protecting intellectual property is crucial in software obfuscation
  • Existing techniques are vulnerable to automated deobfuscation attacks such as symbolic execution, taint analysis, and program synthesis
  • Traditional methods focus on a single attack vector, leaving room for attackers to exploit other techniques like program synthesis
  • Loki is designed to be resilient against all known automated deobfuscation attacks by deploying multiple techniques
  • Includes a generic algorithm for synthesizing formally verified expressions of arbitrary complexity
  • Offers diverse and difficult-to-pattern-match expressions, making it challenging for attackers to simplify the obfuscated code
  • Reduces the success rate of program synthesis attacks to just 19%
  • Loki incurs significantly less overhead while providing robust defense mechanisms against both static and dynamic automated deobfuscation attacks
  • Introduces modern testing techniques like formal verification and fuzzing to ensure correctness of complex obfuscation transformations
  • Represents a significant advancement in code obfuscation technology with high diversity and resilience against various attack vectors, including those based on program synthesis
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi

License: CC BY-NC-SA 4.0

Abstract: Software obfuscation is a crucial technology to protect intellectual property. Despite its importance, commercial and academic state-of-the-art obfuscation approaches are vulnerable to a plethora of automated deobfuscation attacks, such as symbolic execution, taint analysis, or program synthesis. While several enhanced techniques were proposed to thwart taint analysis or symbolic execution, they either impose a prohibitive runtime overhead or can be removed by compiler optimizations. In general, they suffer from focusing on a single attack vector, allowing an attacker to switch to other more effective techniques, such as program synthesis. In this work, we present Loki, an approach for code obfuscation that is resilient against all known automated deobfuscation attacks. To this end, we deploy multiple techniques, including a generic approach to synthesize formally verified expressions of arbitrary complexity. Contrary to state-of-the-art approaches that rely on a few hardcoded generation rules, our expressions are more diverse and harder to pattern match against. Moreover, Loki protects against previously unaccounted attack vectors such as program synthesis, for which it reduces the success rate to merely 19%. Overall, our design incurs significantly less overhead while providing a much stronger protection level.

Submitted to arXiv on 16 Jun. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2106.08913v1

, , , , In the realm of software obfuscation, protecting intellectual property is paramount. However, existing commercial and academic techniques are vulnerable to automated deobfuscation attacks such as symbolic execution, taint analysis, and program synthesis. Some enhanced techniques have been proposed to counter these attacks, but they often come with high runtime overhead or can be circumvented by compiler optimizations. These approaches typically focus on a single attack vector, leaving room for attackers to exploit other more effective techniques like program synthesis. In response to these challenges, a new approach called Loki has been developed. Loki is designed to be resilient against all known automated deobfuscation attacks by deploying multiple techniques, including a generic algorithm for synthesizing formally verified expressions of arbitrary complexity. Unlike traditional methods that rely on a limited set of hardcoded rules, Loki's expressions are diverse and difficult to pattern match against. This diversity makes it challenging for attackers to simplify the obfuscated code statically or dynamically. One key aspect of Loki is its protection against previously unaccounted attack vectors such as program synthesis. By reducing the success rate of program synthesis attacks to just 19%, Loki offers a much stronger level of protection compared to existing methods. Additionally, Loki incurs significantly less overhead while providing robust defense mechanisms against both static and dynamic automated deobfuscation attacks. Furthermore, the design of Loki introduces modern testing techniques like formal verification and fuzzing to ensure the correctness of complex obfuscation transformations. By offering high diversity and resilience against various attack vectors, including those based on program synthesis, Loki represents a significant advancement in code obfuscation technology. Overall, Loki's innovative approach marks a substantial improvement over current state-of-the-art obfuscation schemes by providing enhanced protection levels with reduced overhead. The publication also includes the release of source code and evaluation artifacts for further research and development in this field.
Created on 28 Oct. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.