© recon.cx 2005-2014
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2014 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


DRM obfuscation versus auxiliary attacks

Event_large

Code obfuscation is used in many places nowadays:
  - in software protection, to prevent cracking;
  - in DRM, to prevent piracy;
  - even in exploits, to prevent reverse engineering (see latest evad3rs jailbreak).

We recently analyzed a widely-used DRM system, protected with some new and advanced mixed obfuscation techniques. The innovative part of our talk is that we use new classes of attacks based on auxiliary channels.

This talk is about :
  1) Context evolution tracing
  2) Efficient tracing queries
  3) Obfuscation, such as :
      a) Code flattening
      b) Instruction substitution
      c) Memory wrapping
      d) Crypto whiteboxing
  4) Symbolic execution for function rebuilding
  5) Memory area dependance, changes graphing
  6) Structure prediction

Info

Day: 2014-06-29
Start time: 11:00
Duration: 01:00
Room: Grand Salon Opera
Track: Main

Links:

  • iCalendar

Speakers

Person_small
Mougey Camille
Person_small
Francis Gabriel