CSc 620 Security Through Obscurity

CSc 620

Security Through Obscurity



Schedule

Lecture When Who What Handout

January

1 Thu 10 CC Administrivia, Introduction
2 Tue 15 CC Java VM
3 Thu 17 CC Jasmin
4 Tue 22 CC BCEL
5 Thu 24 CC Program representation
6 Tue 29 CC Steganography
  • Lecture 10 ( PS PS.gz PDF )
  • Techniques for Data Hiding, Bender, Gruhl, Morimoto, Lu.
7 Thu 31 CC Cryptography

February

8 Tue 5 CC Watermarking
9 Thu 7 CC Watermarking
10 Tue 12 CC Code Obfuscation
11 Thu 14 TBA TBA
12 Tue 19 CC BLOAT
13 Thu 21 CC BLOAT
14 Tue 25 Tapas R. Sahoo Software Watermarking
  • Robust Object Watermarking: Application to Code ( PS )
15 Thu 28 CC Project 1 presentations, Dataflow Analysis

March

16 Tue 5 Ginger Myles, Danny Mandel Software Watermarking
  • Fingerprinting IPs Using Constraint-Addition: Approach and Graph Coloring Case Study ( PS )
  • A Graph Theoretic Approach to Software Watermarking ( PS )
17 Thu 7 Balamurgan Chirtsabesan, Anna Segurson Obfuscation
  • Method for renaming identifiers of a computer program ( PS )
  • Protecting Software Code by Guards ( PS )
Tue 12 No class
Thu 14 No class
18 Tue 19 TBA TBA
19 Thu 21 TBA TBA
20 Tue 25 TBA TBA
21 Thu 28 TBA TBA

April

22 Tue 2 TBA TBA
23 Thu 4 TBA TBA
24 Tue 9 TBA TBA
25 Thu 11 TBA TBA
26 Tue 18 TBA TBA
27 Thu 18 TBA TBA
28 Tue 23 TBA TBA
29 Thu 25 TBA TBA
30 Tue 30 TBA TBA

Important links

Project 1

Team Members Project
Kelda and Martio Kelly Heffner and Martin Stepp #1, Rename Fields and Methods
The Cool Dudettes Ginger Myles, Miriam N Miklofsky #2, Add Methods and Fields
The Cool Undecideds Ashok Purushotham, Rathnaprabhu Rajendran #3, Add Bogus Initializers
Exceptions Tapas Ranjan Sahoo , Balamurgan Chirtsabesan #4, Adding Bogus Expressions
Andy and Xiangyu Xiangyu Zhang and Andrew Huntwork #5, Add Bogus Switch Statement
Some cool name Anna Segurson, Danny Mandel #9, Add Bogus Locals

Project 2

Team Members Project
#1, Rename Fields and Methods
#2, Add Bogus Sub-Expressions
The Cool Undecideds Ashok Purushotham, Rathnaprabhu Rajendran #3, Add Bogus Predicates
Andy and Xiangyu Xiangyu Zhang and Andrew Huntwork #4, Add Bogus Method Arguments
Exceptions Tapas Ranjan Sahoo , Balamurgan Chirtsabesan #5, Add Bogus Buggy Code
#6, Encode Integer Constants
The Cool Dudettes Ginger Myles, Miriam N Miklofsky #7, Add Bogus Fields
Some cool name Anna Segurson, Danny Mandel #8, Promote Local Variables
Kelda and Martio Kelly Heffner and Martin Stepp #9, Reordering Methods

Papers 1

Date Author Title Presenter
Feb. 26 Monden A Practical Method for Watermarking Java Programs TBA
Feb. 26 Stern Robust Object Watermarking: Application to Code Tapas R. Sahoo
Feb. 28 Venkatesan A Graph Theoretic Approach to Software Watermarking Daniel Mandel
Feb. 28 Qu Fingerprinting IPs Using Constraint-Addition: Approach and Graph Coloring Case Study Ginger Myles
Mar. 5 Tyma Method for renaming identifiers of a computer program Balamurugan Chirtsabesan
Mar. 5 Chang Protecting Software Code by Guards Anna Segurson
Mar. 7 Cohen Operating System Protection Through Program Evolution Andrew Huntwork
Mar. 7 Wang Protection of Software-based Survivability Mechanisms and Software Tamper Resistance: Obstructing Static Analysis of Programs Kelly T Heffner
Mar. 19 Johnson Encoding Techniques for Software and hardware TBA
Mar. 19 Hohl Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts RathnaPrabhu Rajendran
Mar. 21 Grangeret Use of Pseudocode to Protect Software from Unauthorized Use Xiangyu Zhang
Mar. 21 Horne Dynamic Self-Checking Techniques for Improved Tamper Resistance Miriam N Miklofsky
Mar. 26 Mambo A Tentative Approach to Constructing Tamper-Resistant Software Ashok P. Ramasamy Venkatraj
Mar. 26 Lie Architectural Support for Copy and Tamper Resistant Software Martin D Stepp

Papers 2

Date Author Title Presenter
April 2 Aucsmith Tamper Resistant Software: An implementation Tapas
April 4 Nickerson The Encode Solution to Implementing Tamper Resistant Software; Extending Trust into a Hostile Environment; An Introduction to the Mathematics of Hiding Data in Software. TBA
April 4 Jakobsson Discouraging Software Piracy Using Software Aging Ashok Ramasamy
April 9 Proebsting Krakatoa: Decompilation in Java Balamurugan M. Chirtsabesan
April 9 Cifuentes Decompilation of Binary Programs Rathnaprabhu
April 11 Fred Cohen Computer Viruses - Theory and Experiments Martin Stepp
April 11 AVP Computer Virus Classification. Miriam Miklofsky
April 16 Eichin With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. Ginger
April 16 Dark Avenger Various documents on polymorphic viruses, including Mutation Engine Report, Advanced Polymorphism Primer, etc. Danny Mandel
April 23 Aleph One Smashing the Stack for Fun and Profit Kelly Heffner
April 23 Cesare Anti-Debugger Techniques; Linux Anti-Debugger Techniques (Fooling the Debugger). Xiangyu Zhang
April 25 InterTrust Understanding DRM Systems; Golden times for Digital Rights Management? Andrew Huntwork
April 25 Wayner Mimic Functions Anna Segurson

Back to Collberg's Home Page