Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Protection of Software-Based Survivability Mechanisms
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
A security architecture for survivability mechanisms
A security architecture for survivability mechanisms
Exploiting Self-Modification Mechanism for Program Protection
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Control flow based obfuscation
Proceedings of the 5th ACM workshop on Digital rights management
Manufacturing opaque predicates in distributed systems for code obfuscation
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Binary obfuscation using signals
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A model for self-modifying code
IH'06 Proceedings of the 8th international conference on Information hiding
Software protection through dynamic code mutation
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Mobile Agent Protection with Self-Modifying Code
Journal of Signal Processing Systems
Hi-index | 0.00 |
In most existing digital rights management (DRM) technologies, the DRM agent, or DRM client, contains the content protection mechanisms applied to the system. However, the DRM agent that runs at the consumer side is often exposed to reverse engineering to compromise DRM agent or to obtain the secret license information kept at the DRM agent. In this paper, we propose an algorithm to protect against the reverse engineering of DRM agent codes and thus to protect the inside workings of the DRM agents. Our algorithm is based on self-modifying code and control flow flatten techniques. And after applying our algorithm, the agent software becomes hard to be analyzed by the attacker, which can be seen from the experimental results.