Embedded software security through key-based control flow obfuscation

  • Authors:
  • Rajat Subhra Chakraborty;Seetharam Narasimhan;Swarup Bhunia

  • Affiliations:
  • Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, West Bengal, India;Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH;Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH

  • Venue:
  • InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Protection against software piracy and malicious modification of software is proving to be a great challenge for resource-constrained embedded systems. In this paper, we develop a non-cryptographic, keybased, control flow obfuscation technique, which can be implemented by computationally efficient means, and is capable of operating with minimal hardware support. The scheme is based on matching a series of expected keys in sequence, similar to the unlocking process in a combination lock, and provides high levels of resistance to static and dynamic analyses. It is capable of protecting embedded software against both piracy as well as non-self-replicating malicious modifications. Simulation results on a set of MIPS assembly language programs show that the technique is capable of providing high levels of security at nominal computational overhead and about 10% code-size increase.