It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The idea of “obfuscating” a program had been around for decades, but no one had ever developed a rigorous mathematical framework for the concept, let alone created an unassailable obfuscation scheme. Over the years, commercial software companies have engineered various techniques for garbling a computer program so that it will be harder to understand while still performing the same function. But hackers have defeated every attempt. At best, these commercial obfuscators offer a “speed bump,” said Sahai, now a computer science professor at the University of California, Los Angeles. “An attacker might need a few days to unlock the secrets hidden in your software, instead of a few minutes.”
...
“You could send that agent into the computing wild, including onto untrusted computers,” Sahai said. “It could be captured by the enemy, interrogated, and disassembled, but it couldn’t be forced to reveal your secrets.”
Any program that has to decrypt itself in order to run, will have an execution path that will find a worthy attacker.
AliceBleachWhite
reply to post by ChaoticOrder
Excellent point.
However, on a level playing field (not that there ever will be one since many people settle for older tech as long as useful until forced to upgrade), the malicious code will be attempting to compromise software it can't see inside to compromise.
Whatever the case may be, it's an interesting development that should amount to some bar-raising in information security circles under hats of all colors and shades; black, white, grey, red, whatever.
bobs_uruncle
Once in memory, code is code. If you run a memory imager in background, you will have the source code in hex. Then it becomes a simple matter to disassemble the code and find the key.
Cheers - Dave
AliceBleachWhite
bobs_uruncle
Once in memory, code is code. If you run a memory imager in background, you will have the source code in hex. Then it becomes a simple matter to disassemble the code and find the key.
Cheers - Dave
Aha.
So, that's how all the cool kids are doing it these days!
Well, in one vein, the optimisms expressed here for defeating this work in development gives me hope that the torrent sites still have some measure of time to continue offering the latest in retail software.
On the other hand, it gives me a wee bit of sad that we're still out a solution for regaining online anonymity from the spooks, just on principle.
I mean, secure is suppose to be SECURE, not, "secure except where big brother is concerned".
eh.edit on 2/4/2014 by AliceBleachWhite because: (no reason given)
masterp
It's funny that self-decrypting software is being ignored as a solution.
In self-decrypting software, each instruction not only contains the operation to execute, but also the code to decrypt the next instruction.
Altering the instruction stream would result in a totally different execution path, thus never allowing hackers to peek inside the actual software.
ChaoticOrder
reply to post by Arrow22
Any program that has to decrypt itself in order to run, will have an execution path that will find a worthy attacker.
The real problem is, that any program which has to decrypt itself in order to run must also have the decryption key stored in the source code. And the only way to protect the decryption key in that case is to obfuscate it. Right back to step one.
charlyv
It might take a collaboration of both software and hardware to pull this off. There could be an on-chip mechanism that works in conjunction with the cyphered machine code that would make it extremely difficult, if not impossible, to hack the program. These things are definitely over due, as we have certainly seen just the beginning of the damage caused by cyber espionage
Laykilla
Although, we see a very similar approach in computer games like Diablo III, that has still never been pirated to this day.