Chit Saw - Academia.edu (original) (raw)

Related Authors

Ali Ahmed

Ali Ahmed

University of Liverpool online programme with Laureate

Manuel David Masseno

Anirach Mingkhwan

Armando Marques-Guedes

Dr. Gulshan Shrivastava

Zdravka  Krasteva

Eoghan  Casey

Omer Jasim

Rana Pir

Uploads

Papers by Chit Saw

Research paper thumbnail of The Superdiversifier: Peephole Individualization for Software Protection

Lecture Notes in Computer Science, 2008

Research paper thumbnail of Runtime Protection via Dataflow Flattening

2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009

Software running on an open architecture, such as the PC, is vulnerable to inspection and modific... more Software running on an open architecture, such as the PC, is vulnerable to inspection and modification. Since software may process valuable or sensitive information, many defenses against data analysis and modification have been proposed. This paper complements existing work and focuses on hiding data location throughout program execution. To achieve this, we combine three techniques: (i) periodic reordering of the heap, (ii) migrating local variables from the stack to the heap and (iii) pointer scrambling. By essentialy flattening the dataflow graph of the program, the techniques serve to complicate static dataflow analysis and dynamic data tracking. Our methodology can be viewed as a data-oriented analogue of control-flow flattening techniques.

Research paper thumbnail of The Superdiversifier: Peephole Individualization for Software Protection

Lecture Notes in Computer Science, 2008

Research paper thumbnail of Runtime Protection via Dataflow Flattening

2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009

Software running on an open architecture, such as the PC, is vulnerable to inspection and modific... more Software running on an open architecture, such as the PC, is vulnerable to inspection and modification. Since software may process valuable or sensitive information, many defenses against data analysis and modification have been proposed. This paper complements existing work and focuses on hiding data location throughout program execution. To achieve this, we combine three techniques: (i) periodic reordering of the heap, (ii) migrating local variables from the stack to the heap and (iii) pointer scrambling. By essentialy flattening the dataflow graph of the program, the techniques serve to complicate static dataflow analysis and dynamic data tracking. Our methodology can be viewed as a data-oriented analogue of control-flow flattening techniques.

Log In