Attacking an obfuscated cipher by injecting faults

Matthias Jacob, Dan Boneh, Edward Felten

Research output: Chapter in Book/Report/Conference proceedingChapter

37 Scopus citations

Abstract

We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduce the obfuscated information in the program code without having to unravel the obfuscation mechanism. We apply this technique to extract a secret key from a block cipher obfuscated using a commercial obfuscation tool and draw conclusions on preventing this weakness.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsJoan Feigenbaum
PublisherSpringer Verlag
Pages16-31
Number of pages16
ISBN (Print)9783540449935
DOIs
StatePublished - Jan 1 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2696
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Attacking an obfuscated cipher by injecting faults'. Together they form a unique fingerprint.

  • Cite this

    Jacob, M., Boneh, D., & Felten, E. (2003). Attacking an obfuscated cipher by injecting faults. In J. Feigenbaum (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 16-31). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2696). Springer Verlag. https://doi.org/10.1007/978-3-540-44993-5_2