Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
- Authors
- Kim, Min-Jae; Lee, Jin-Young; Chang, Hye-Young; Cho, Seong Je; Park, Minkyu; Park, Yongsu; Wilsey, Philip A.
- Issue Date
- Jun-2010
- Publisher
- IEEE
- Keywords
- AES encryption; Embedded systems; Packing; Reverse engineering; Secure UPX
- Citation
- ISORC 2010 - 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, v.1, pp.80 - 86
- Indexed
- SCOPUS
- Journal Title
- ISORC 2010 - 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing
- Volume
- 1
- Start Page
- 80
- End Page
- 86
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/174811
- DOI
- 10.1109/ISORC.2010.23
- ISSN
- 0000-0000
- Abstract
- Packing (or executable compression) is considered as one of the most effective anti-reverse engineering methods in the Microsoft Windows environment. Even though many reversing attacks are widely conducted in the Linux-based embedded system there is no widely used secure binary code packing tools for Linux. This paper presents two secure packing methods that use AES encryption and the UPX packer to protect the intellectual property (IP) of software from reverse engineering attacks on Linux-based embedded system. We call these methods: secure UPX and AES-encryption packing. Since the original UPX system is designed not for software protection but for code compression, we present two anti-debugging methods in the unpacking module of the secure UPX to detect or abort reverse engineering attacks. Furthermore, since embedded systems are highly resource constrained, minimizing unpacking overhead is important. Therefore, we analyze the performance of the two packing methods from the perspective of: (i) code size, (ii) execution time, and (iii) power consumption. Our analysis results show that the Secure UPX performs better than AES-encryption packing in terms of the code size, execution time, and power consumption.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/174811)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.