DRM obfuscation versus auxiliary attacks
Code obfuscation is used in many places nowadays:
- in software protection, to prevent cracking;
- in DRM, to prevent piracy;
- even in exploits, to prevent reverse engineering (see latest evad3rs jailbreak).
We recently analyzed a widely-used DRM system, protected with some new and advanced mixed obfuscation techniques. The innovative part of our talk is that we use new classes of attacks based on auxiliary channels.
This talk is about :
1) Context evolution tracing
2) Efficient tracing queries
3) Obfuscation, such as :
a) Code flattening
b) Instruction substitution
c) Memory wrapping
d) Crypto whiteboxing
4) Symbolic execution for function rebuilding
5) Memory area dependance, changes graphing
6) Structure prediction
Speakers
Mougey Camille | |
Francis Gabriel |