Deobfuscation DRM by auxiliary attacks presented at SSTIC 2014

by Francis Gabriel, Camille Mougey,

Summary : This presentation focuses on the analysis of a DRM ("Digital Rights Management") with widespread and fairly advanced in terms of obfuscation features. To understand its operation, the conventional methods of reverse engineering (or reverse engineering) having proved ineffective, the choice was made to focus on a trace analysis approach. To this end, the framework "GTW" was developed. Through the presentation, we show how this approach has facilitated the analysis of portions of code heavily obscured, interweaving several protections. We present the mechanisms used by these protections, as well as the methods used to circumvent them.