Formal Verification of a Program Obfuscation Based on Mixed Boolean-Arithmetic Expressions

被引:8
作者
Blazy, Sandrine [1 ]
Hutin, Remi [1 ]
机构
[1] Univ Rennes, CNRS, INRIA, IRISA, Rennes, France
来源
PROCEEDINGS OF THE 8TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP' 19) | 2019年
关键词
bitwise arithmetic; program obfuscation; CompCert verified compiler;
D O I
10.1145/3293880.3294103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The insertion of expressions mixing arithmetic operators and bitwise boolean operators is a widespread protection of sensitive data in source programs. This recent advanced obfuscation technique is one of the less studied among program obfuscations even if it is commonly found in binary code. In this paper, we formally verify in Coq this data obfuscation. It operates over a generic notion of mixed boolean-arithmetic expressions and on properties of bitwise operators operating over machine integers. Our obfuscation performs two kinds of program transformations: rewriting of expressions and insertion of modular inverses. To facilitate its proof of correctness, we define boolean semantic tables, a data structure inspired from truth tables. Our obfuscation is integrated into the CompCert formally verified compiler where it operates over Clight programs. The automatic extraction of our program obfuscator into OCaml yields a program with competitive results.
引用
收藏
页码:196 / 208
页数:13
相关论文
共 17 条
[1]   Formal Verification of Control-Flow Graph Flattening [J].
Blazy, Sandrine ;
Trieu, Alix .
PROCEEDINGS OF THE 5TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP'16), 2016, :176-187
[2]   Mechanized Semantics for the Clight Subset of the C Language [J].
Blazy, Sandrine ;
Leroy, Xavier .
JOURNAL OF AUTOMATED REASONING, 2009, 43 (03) :263-288
[3]  
Blazy Sandrine, 2012, SSP 2012
[4]  
Collberg C., 2009, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
[5]  
Collberg Christian, 2014, TIGRESS C DIVERSIFIE
[6]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[7]  
Drape S, 2007, LECT NOTES COMPUT SC, V4779, P299
[8]   Defeating MBA-based Obfuscation [J].
Eyrolles, Ninon ;
Goubin, Louis ;
Videau, Marion .
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, :27-37
[9]  
Eyrolles Ninon, 2017, THESIS
[10]  
Griswold M, 2007, BIOL REPROD, P61