Invention Grant
- Patent Title: Protecting software through a fake cryptographic layer
-
Application No.: US14306713Application Date: 2014-06-17
-
Publication No.: US09639673B2Publication Date: 2017-05-02
- Inventor: Pierre Betouin , Augustin J. Farrugia , Benoit Chevallier-Mames , Bruno Kindarji , Cédric Tessier , Jean-Baptiste Aviat , Mathieu Ciet , Thomas Icart
- Applicant: Apple Inc.
- Applicant Address: US CA Cupertino
- Assignee: Apple Inc.
- Current Assignee: Apple Inc.
- Current Assignee Address: US CA Cupertino
- Agency: Blakely, Sokoloff, Taylor & Zafman LLP
- Main IPC: G06F21/14
- IPC: G06F21/14

Abstract:
The fake cryptographic layer obfuscation technique can be used to lure an attacker into expending reverse engineering efforts on sections of code the attacker would normally ignore. To do this the obfuscation technique can identify sections of code that are likely to be of lesser interest to the attacker and disguise them as higher value sections. This can be achieved by transforming a lower value section of code to include code patterns, constants, or other characteristics known to exist in sections of code of higher value, such as cryptographic routines. To transform a code section, the obfuscation technique can use one or more program modifications including control flow modifications, constant value adjustments to simulate well-known cryptographic scalars, buffer extensions, fake characteristic table insertion, debug-like information insertion, derivation function-code generation linking, and/or cryptographic algorithm specific instruction insertion.
Public/Granted literature
- US20150363580A1 PROTECTING SOFTWARE THROUGH A FAKE CRYPTOGRAPHIC LAYER Public/Granted day:2015-12-17
Information query