ABSTRACT
The success of new technologies depends on whether proper usage models can be found to support them. In this paper we present such a model for Intel's Software Guard Extensions (SGX) -- the leveraging of the technology to provide copy protection to software. We describe the system that we architected, designed and implemented, which transforms, in a fully automated manner, off-the-shelve applications into secured versions that run on top of the enclaves. Our system can be delivered as stand-alone, but also as a layer in existing software copy protection stacks.
- BSA. http://globalstudy.bsa.org/2013/downloads/studies/2013GlobalSurvey_Study_en.pdf.Google Scholar
- Microcosm. http://www.microcosm.co.uk.Google Scholar
- Wibu-Systems. http://www.wibu.com.Google Scholar
- A. Balakrishnan and C. Schulze. Code obfuscation literature survey. http://pages.cs.wisc.edu/arinib/writeup.pdf, 2005.Google Scholar
- A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pages 267--283, 2014. Google ScholarDigital Library
- S. Checkoway and H. Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 253--264, 2013. Google ScholarDigital Library
- C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations, 1997.Google Scholar
- I. Corp. Software Guard Extensions Programming Reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf, 2014.Google Scholar
- C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 190--200, 2005. Google ScholarDigital Library
- F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013. Google ScholarDigital Library
- C. W. O'Donnell, G. E. Suh, M. van Dijk, and S. Devadas. Memoization attacks and copy protection in partitioned applications. In Proceedings of the 2007 IEEE Workshop on Information Assurance (IAW), 2007.Google ScholarCross Ref
- M. Venable, M. R. Chouchane, M. E. Karim, and A. Lakhotia. Analyzing memory accesses in obfuscated x86 executables. In Proceedings of the Second International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'05, pages 1--18. Springer-Verlag, 2005. ISBN 3-540-26613-5, 978-3-540-26613-6. Google ScholarDigital Library
- D. S. Wallach. Copy protection technology is doomed. IEEE Computer, 34(10):48--49, Oct. 2001. Google ScholarDigital Library
- L. Ying, P. Su, D. Feng, X. Wang, Y. Yang, and Y. Liu. Reconbin: Reconstructing binary file from execution for software analysis. In Third IEEE International Conference ob Secure Software Integration and Reliability Improvement, pages 222-- 229, 2009. Google ScholarDigital Library
- X. Zhang and R. Gupta. Hiding program slices for software security. In 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 23-26 March 2003, San Francisco, CA, USA, pages 325--336, 2003. Google ScholarDigital Library
Index Terms
- Helping Protect Software Distribution with PSWD
Recommendations
Attacks and risk analysis for hardware supported software copy protection systems
DRM '04: Proceedings of the 4th ACM workshop on Digital rights management<i>Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a specially tailored secure processor to prevent, 1) illegal software ...
JITGuard: Hardening Just-in-time Compilers with SGX
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityMemory-corruption vulnerabilities pose a serious threat to modern computer security. Attackers exploit these vulnerabilities to manipulate code and data of vulnerable applications to generate malicious behavior by means of code-injection and code-reuse ...
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityIntel Software Guard Extension (SGX) offers software applications a shielded execution environment, dubbed enclave, to protect their confidentiality and integrity from malicious operating systems. As processors with this extended feature become ...
Comments