Attacking an Obfuscated Cipher by Injecting Faults. Jacob, M., Boneh, D., & Felten, E. In Goos, G., Hartmanis, J., van Leeuwen, J., & Feigenbaum, J., editors, Digital Rights Management, volume 2696, pages 16–31. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. Paper doi abstract bibtex We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduce the obfuscated information in the program code without having to unravel the obfuscation mechanism. We apply this technique to extract a secret key from a block cipher obfuscated using a commercial obfuscation tool and draw conclusions on preventing this weakness.
@incollection{goos_attacking_2003,
address = {Berlin, Heidelberg},
title = {Attacking an {Obfuscated} {Cipher} by {Injecting} {Faults}},
volume = {2696},
isbn = {978-3-540-40410-1 978-3-540-44993-5},
url = {http://link.springer.com/10.1007/978-3-540-44993-5_2},
abstract = {We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduce the obfuscated information in the program code without having to unravel the obfuscation mechanism. We apply this technique to extract a secret key from a block cipher obfuscated using a commercial obfuscation tool and draw conclusions on preventing this weakness.},
language = {en},
urldate = {2018-10-17},
booktitle = {Digital {Rights} {Management}},
publisher = {Springer Berlin Heidelberg},
author = {Jacob, Matthias and Boneh, Dan and Felten, Edward},
editor = {Goos, Gerhard and Hartmanis, Juris and van Leeuwen, Jan and Feigenbaum, Joan},
year = {2003},
doi = {10.1007/978-3-540-44993-5_2},
pages = {16--31}
}
Downloads: 0
{"_id":"bDZu3yBLm8Dh8wHdY","bibbaseid":"jacob-boneh-felten-attackinganobfuscatedcipherbyinjectingfaults-2003","authorIDs":[],"author_short":["Jacob, M.","Boneh, D.","Felten, E."],"bibdata":{"bibtype":"incollection","type":"incollection","address":"Berlin, Heidelberg","title":"Attacking an Obfuscated Cipher by Injecting Faults","volume":"2696","isbn":"978-3-540-40410-1 978-3-540-44993-5","url":"http://link.springer.com/10.1007/978-3-540-44993-5_2","abstract":"We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduce the obfuscated information in the program code without having to unravel the obfuscation mechanism. We apply this technique to extract a secret key from a block cipher obfuscated using a commercial obfuscation tool and draw conclusions on preventing this weakness.","language":"en","urldate":"2018-10-17","booktitle":"Digital Rights Management","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Jacob"],"firstnames":["Matthias"],"suffixes":[]},{"propositions":[],"lastnames":["Boneh"],"firstnames":["Dan"],"suffixes":[]},{"propositions":[],"lastnames":["Felten"],"firstnames":["Edward"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Goos"],"firstnames":["Gerhard"],"suffixes":[]},{"propositions":[],"lastnames":["Hartmanis"],"firstnames":["Juris"],"suffixes":[]},{"propositions":["van"],"lastnames":["Leeuwen"],"firstnames":["Jan"],"suffixes":[]},{"propositions":[],"lastnames":["Feigenbaum"],"firstnames":["Joan"],"suffixes":[]}],"year":"2003","doi":"10.1007/978-3-540-44993-5_2","pages":"16–31","bibtex":"@incollection{goos_attacking_2003,\n\taddress = {Berlin, Heidelberg},\n\ttitle = {Attacking an {Obfuscated} {Cipher} by {Injecting} {Faults}},\n\tvolume = {2696},\n\tisbn = {978-3-540-40410-1 978-3-540-44993-5},\n\turl = {http://link.springer.com/10.1007/978-3-540-44993-5_2},\n\tabstract = {We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduce the obfuscated information in the program code without having to unravel the obfuscation mechanism. We apply this technique to extract a secret key from a block cipher obfuscated using a commercial obfuscation tool and draw conclusions on preventing this weakness.},\n\tlanguage = {en},\n\turldate = {2018-10-17},\n\tbooktitle = {Digital {Rights} {Management}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Jacob, Matthias and Boneh, Dan and Felten, Edward},\n\teditor = {Goos, Gerhard and Hartmanis, Juris and van Leeuwen, Jan and Feigenbaum, Joan},\n\tyear = {2003},\n\tdoi = {10.1007/978-3-540-44993-5_2},\n\tpages = {16--31}\n}\n\n","author_short":["Jacob, M.","Boneh, D.","Felten, E."],"editor_short":["Goos, G.","Hartmanis, J.","van Leeuwen, J.","Feigenbaum, J."],"key":"goos_attacking_2003","id":"goos_attacking_2003","bibbaseid":"jacob-boneh-felten-attackinganobfuscatedcipherbyinjectingfaults-2003","role":"author","urls":{"Paper":"http://link.springer.com/10.1007/978-3-540-44993-5_2"},"downloads":0,"html":""},"bibtype":"incollection","biburl":"https://bibbase.org/zotero/21h","creationDate":"2020-05-22T18:11:30.459Z","downloads":0,"keywords":[],"search_terms":["attacking","obfuscated","cipher","injecting","faults","jacob","boneh","felten"],"title":"Attacking an Obfuscated Cipher by Injecting Faults","year":2003,"dataSources":["NpxDwkFvCjNmGYFSj"]}