virtualization obfuscation - headings

2
1. Introduction 1.1 - motivation - the problem - see proposal 1.2 - contribution - goal - see proposal 1.3 - thesis structure 2. Background 2.1. Software protection 2.1.1 - different types of software protection taxonomia lui Collberg in Background chapter talk about Legal, Remote Services, Encryption, Machine / Native code, Obfuscation 2.1.2 - obfuscation in general different obfuscation techniques 2.1.3 - Virtualization obfuscation - concept - usage 2.2. Software attacks 2.2.1 Static analysis summary of papers + - papers and tools - attacking VO 2.2.2 Dynamic analysis summary of papers + - papers and tools - attacking VO 2.2.3 State of the Art tools - obfuscators Agile.Net, Eazfuscator ... - deobfuscators / decompilers - opensource ConfuserEx 3. Design and Implementation 3.1 Virtualization Level 2pg 3.1. Virtualization Algorithm - Refactoring - Virtualization - use cases, examples 2 pg 3.2. Obfuscator Archictecture 4.2 Types of Refactorings 2 pg 4.3 Types of Interpreters - class, instance, method 2pg 3.3. Obfuscator Settings - levels of randomness, frequency analysis mitigation 3pg 3.4. Obfuscator Limitations - Implementation: lambda expressions - Challenges - Security (data structure visible) 2 pg 4. Evaluation

Upload: cipri7329

Post on 15-Apr-2016

217 views

Category:

Documents


3 download

DESCRIPTION

chapters for virtualization obfuscation thesis

TRANSCRIPT

Page 1: virtualization obfuscation - headings

1. Introduction

1.1 - motivation - the problem - see proposal1.2 - contribution - goal - see proposal1.3 - thesis structure

2. Background2.1. Software protection

2.1.1 - different types of software protectiontaxonomia lui Collberg in Background chaptertalk about Legal, Remote Services, Encryption, Machine / Native

code, Obfuscation2.1.2 - obfuscation in generaldifferent obfuscation techniques2.1.3 - Virtualization obfuscation

- concept- usage

2.2. Software attacks

2.2.1 Static analysissummary of papers + - papers and tools- attacking VO

2.2.2 Dynamic analysissummary of papers + - papers and tools- attacking VO

2.2.3 State of the Art tools- obfuscators Agile.Net, Eazfuscator ...- deobfuscators / decompilers- opensource ConfuserEx

3. Design and Implementation

3.1 Virtualization Level2pg

3.1. Virtualization Algorithm- Refactoring- Virtualization- use cases, examples

2 pg

3.2. Obfuscator Archictecture

4.2 Types of Refactorings2 pg

4.3 Types of Interpreters- class, instance, method2pg

3.3. Obfuscator Settings- levels of randomness, frequency analysis mitigation3pg

3.4. Obfuscator Limitations- Implementation: lambda expressions- Challenges- Security (data structure visible)

2 pg

4. Evaluation

Page 2: virtualization obfuscation - headings

4.1 Collberg's taxonomyPotency, Resilience, Cost, Stealthtaxonomia lui Collberg in Background chapterEvaluation framework

4.2 Manual Static Analysis- inspect bytecode

4.3 Dynamic Automatic Analysis- levenstein distance

5.3 Cost: How much time/space overhead is added?- performance

runtime overhead

5. Conclusions

6. Future work - attacks