Star 0

Abstract

Reverse engineering software is commonly done and has various goals such as finding vulnerabil
ities, learning about security mechanisms and countermeasures, and for general understanding a
nd information extraction. Obviously all software will be reverse engineered at some point but
you will never really find out. This talk is about detecting if your software is being revers
e engineered. Software is complex and reverse engineering is hard. People will "cheat" and sea
rch the web for clues about your software. The idea behind this research is that this "cheatin
g" can be detected. The idea is to embed canaries into binaries and application data to help d
etecting "reverse engineering" at the time when somebody searches the web for your tokens. In
the talk we will discuss different ideas around this general idea and how this can be implemen
ted. Finally we show how this can be used to detect different level of adversaries.

Slides