Getting Revenge: a System for Analyzing Reverse Engineering Behavior

Total Page:16

File Type:pdf, Size:1020Kb

Getting Revenge: a System for Analyzing Reverse Engineering Behavior Getting RevEngE: A System for Analyzing Reverse Engineering Behavior Claire Taylor Christian Collberg Department of Computer Science University of Arizona Tucson, AZ 85721 [email protected], [email protected] Abstract Code obfuscation is a popular technique used by white- ⓵ ⓶ ⓷ Generate 1 Script2 Challenge Script Generate Obfuscate Compile as well as black-hat developers to protect their software Asset Random p0.c p1.c p2.exe Program Program Program from Man-At-The-End attacks. A perennial problem has Seed1 Seed2 been how to evaluate the power of different obfuscation Solve Challenge ⓸ Analyze Results techniques. However, this evaluation is essential in order Reward ($) ⓹ Correctness Virtual Machine p3.c to be able to recommend which combination of techniques & Precision Reverse User p2.exe Engineering to employ for a particular application, and to estimate how Monitor Tools User ⓺ Analysis & long protected assets will survive in the field. We describe a Actions Visualization system, RevEngE, that generates random obfuscated chal- lenges, asks reverse engineers to solve these challenges Figure 1: System Overview. (with promises of monetary rewards if successful), monitors and collects data on how the challenges were solved, and verifies the correctness of submitted solutions. Finally, the technique. system analyzes the actions of the engineers to determine Attacks on obfuscation (known as reverse engineering the sequence and duration of techniques employed, with the or deobfuscation) aim to defeat the obfuscating transforma- ultimate goal of learning the relative strengths of different tions by extracting a close facsimile of the asset a from P 0. combinations of obfuscations. Much work has gone into developing methods to evalu- ate obfuscating transformations. Fundamental questions we may want to ask include (a) “how long will asset a survive 1 Introduction in the field in a program P 0 that has been protected with Code Obfuscation seeks to protect valuable assets con- obfuscating transform T ?”; (b) “how do transformations T1 tained in software from those who have full access to it by and T2 compare with respect to their protective power and making the software difficult to analyze. An obfuscator O performance degradation?”; and (c) “what level of diversity applies a sequence of code transformations T1 ◦T2 ◦T3 ◦::: can transformation T induce?” to an input program P containing an asset a, transforming it Unfortunately, the validity of any theoretical models we into a program P 0 = O(P ), such that P and P 0 are seman- develop to answer such questions will ultimately depend on tically identical, but extracting a from P 0 is more difficult how we define the power of the adversary. than extracting a from P . Common assets include crypto- In the project we report on here, we present a system, graphic keys, proprietary algorithms, security checks, etc. RevEngE (Reverse Engineering Engine), designed to build Obfuscating transformations are also used to induce diver- models from the behavior of reverse engineers. Figure 1 sity: given an original program P , a diversifying obfusca- shows an overview of the system. Specifically, RevEngE tor generates a large number of semantically identical but generates a secret random program p0:c (point 1 in Fig- 0 0 syntactically different programs fP1;P2;:::g. Diversity is ure 1) and transforms it with a variety of obfuscating trans- a defense against class attacks, where a single attack can formations to a program p1:c (point 2) to create a collec- successfully target all programs protected with a particular tion of reverse engineering challenges. These challenge programs are made available to reverse engineering experts 2.2 Analyzing Obfuscation Resilience anywhere to solve (point 3). Experts download the chal- There exist many obfuscating transforms and reverse en- 2 lenge p :exe into a virtual machine (point 4) equipped with gineering methods. Some are known through the academic a data collection subsystem that monitors and stores the en- literature, others are kept proprietary by purveyors of obfus- gineers’ behavior as they attempt the challenges. The re- cation tools, nation-states, and hackers. Furthermore, there 3 verse engineers submit a de-obfuscated solution p :c which are innumerable ways to combine such methods [19]. is checked for correctness (point 5). To act as an incentive Evaluating the efficacy of strategies for obfuscation and for accomplished reverse engineers to participate, substan- reverse engineering has proven to be difficult: for a given tial monetary awards are handed out to successful partici- obfuscation, many reverse engineering techniques might pants. The recorded user actions are analyzed (point 6) to counter it, and for a given reverse engineering technique create reverse engineering attack models, such as visualiza- many obfuscations can render it ineffective. tions, trees, and Petri nets. The anonymized data set will be made available to the community for further analysis. 2.2.1 Normative Evaluation This paper is organized as follows. Section 2 discusses Some work attempts to reduce the complexity of an ob- prior work on code obfuscation. Section 3 presents the de- fuscation technique to a known hard problem [16]. For sign of RevEngE. Section 4 presents an evaluation of the example, it has been argued that opaque constants can be system, and Section 5 concludes. based on hard problems [31]. Unfortunately, this type of ar- gument is fraught with issues. For example, just because a 2 Related Work problem is hard in the worst case does not mean that a ran- dom instance will be, or that probabilistic algorithms cannot We will next discuss prior work on obfuscation, obfus- give an acceptable solution in reasonable amounts of time, cation evaluation techniques, and the use of challenge prob- or that the size of the problem will be sufficient. Addition- lems to advance computer security. ally, assumptions made for normative evaluation—such as assuming static analysis only—often do not align with real 2.1 Obfuscation world techniques. Finally, the human element and intuition is not captured by normative evaluation. Obfuscating code transformations to protect assets in software date back at least to the early 1990s [17]. Progress 2.2.2 Software Metrics was initially driven by the needs to protect cryptographic It has been argued [16] that some software engineer- operations in Digital Rights Management systems [20, 12] ing metrics, such as control flow complexity, are related to and to hide algorithms in easily decompilable languages the difficulty of reverse engineering an obfuscated program. like Java [16]. Diversification also motivated engineers, However, this notion does not hold much promise, as empir- both to protect operating system mono-cultures against at- ical studies have shown no correlation between such metrics tacks by malware [13], and, interestingly, to protect mal- and human ability to reverse engineer [30]. ware from detection [27]. The literature is rife with descriptions of obfuscating 2.2.3 Empirical Studies code transformations [15]. They typically fall in three cate- Empirical analysis seeks to demonstrate the resilience of gories: control flow, data, and abstraction transformations. an obfuscation technique by testing it against reverse engi- Examples of control flow transformations include control neering attacks. Generally, empirical analysis focuses on flow flattening which removes existing control flow [33] two questions: and opaque predicate insertion which adds bogus control flow [16]. An extreme version of flattening is virtualiza- 1. How well does an obfuscation technique resist an au- tion [36], in which the obfuscator generates a random vir- tomated attack, using a particular tool or code analysis tual instruction set (V-ISA) for the target program P , trans- algorithm? lates P into this V-ISA, and generates a interpreter that 2. How well does an obfuscation technique resist a hu- executes programs in the V-ISA. Data obfuscations trans- man attacker attempting to reverse engineer the pro- form variables into a different representation, for example tected code? by encrypting them, xor:ing them with a random constant, or converting them into a representation based on Mixed For the first question, researchers generate obfuscated Boolean Arithmetic [38]. Examples of abstraction transfor- code with an obfuscator and then run an automated tool on mations, finally, include class hierarchy flattening [18] and that code [2, 4, 3]. Success metrics include whether the au- traditional optimizing transformations such as inlining, out- tomated tool extracted the protected asset or not, and the lining, and loop unrolling. amount of resources (time and memory) consumed. 2.2.4 Human Studies with high quality subjects, incurs large costs, drastically Ceccato et al. [8] argue that there is a ”Need for More limiting scalability, both in terms of subject sample size and Human Studies to Assess Software Protection.” Several the diversity of the transforms tested. such experiments have been carried out. In [10], Ceccato et al. conducted experiments to analyze the potency of an 3 Methodology identifier renaming transform using Masters and PhD stu- Our goal is to collect and analyze data about the strate- dents as subjects. In [9] they expanded upon this earlier gies employed by reverse engineers. This data can be used work with more students and more transforms. Viticchie´ et to construct behavioral models which, in turn, can be used al. [32] conducted a similar
Recommended publications
  • Bad Girls: Agency, Revenge, and Redemption in Contemporary Drama
    e Interdisciplinary Journal of Popular Culture and Pedagogy Bad Girls: Agency, Revenge, and Redemption in Contemporary Drama Courtney Watson, Ph.D. Radford University Roanoke, Virginia, United States [email protected] ABSTRACT Cultural movements including #TimesUp and #MeToo have contributed momentum to the demand for and development of smart, justified female criminal characters in contemporary television drama. These women are representations of shifting power dynamics, and they possess agency as they channel their desires and fury into success, redemption, and revenge. Building on works including Gillian Flynn’s Gone Girl and Netflix’s Orange is the New Black, dramas produced since 2016—including The Handmaid’s Tale, Ozark, and Killing Eve—have featured the rise of women who use rule-breaking, rebellion, and crime to enact positive change. Keywords: #TimesUp, #MeToo, crime, television, drama, power, Margaret Atwood, revenge, Gone Girl, Orange is the New Black, The Handmaid’s Tale, Ozark, Killing Eve Dialogue: The Interdisciplinary Journal of Popular Culture and Pedagogy 37 Watson From the recent popularity of the anti-heroine in novels and films like Gone Girl to the treatment of complicit women and crime-as-rebellion in Hulu’s adaptation of The Handmaid’s Tale to the cultural watershed moments of the #TimesUp and #MeToo movements, there has been a groundswell of support for women seeking justice both within and outside the law. Behavior that once may have been dismissed as madness or instability—Beyoncé laughing wildly while swinging a baseball bat in her revenge-fantasy music video “Hold Up” in the wake of Jay-Z’s indiscretions comes to mind—can be examined with new understanding.
    [Show full text]
  • The Pathologising Effect of TV Revengendas
    University of Wollongong Research Online Faculty of Law, Humanities and the Arts - Papers Faculty of Arts, Social Sciences & Humanities 1-1-2015 The bitter taste of payback: the pathologising effect of TV revengendas Cassandra E. Sharp University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/lhapapers Part of the Arts and Humanities Commons, and the Law Commons Recommended Citation Sharp, Cassandra E., "The bitter taste of payback: the pathologising effect of TV revengendas" (2015). Faculty of Law, Humanities and the Arts - Papers. 2422. https://ro.uow.edu.au/lhapapers/2422 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] The bitter taste of payback: the pathologising effect of TV revengendas Abstract The thirst for vengeance is a timeless subject in popular entertainment. One need only think of Old Testament scripture; Shakespeare's Hamlet; Quentin Tarantino's Kill Bill or the TV series Revenge, and we immediately conjure up images of a protagonist striving to seek justice to avenge a heinous wrong committed against them. These texts, and others like it, speak to that which is ingrained in our human spirit about not only holding others responsible for their actions, but also about retaliation as payback. This article seeks to problematise the way the popular revenge narrative effectively constructs the vendetta as a guilty pleasure through which the audience can vicariously gain satisfaction, while at the same time perpetuates law's rhetoric that personal desires for vengeance are to be repressed and denied.
    [Show full text]
  • Jastics Delays' Rsveüge
    Jastics Delays’ Rsveüge- . ■ C il 1X1 a i - . : . "Г / с;. Justice Delays Revenge- The Spanish Tragedy and Revenge Tradition A Thesis Submitted to the Faculty of Letters and the Institute of Economics and Social Sciences of Bilkent University in Partial Fulfilment of the Requirements for the Degree of Master of Arts in English Language and Literature ta «4^^ by Erhan Kukner September, 1991 PR. Л.65'4 ' S63 è- 3079 We certify that we have read this thesis and that in our combined opinion it is fully adequate, in scope and in quality, as a thesis for the degree of Master of Arts. Asst.Prof.Dr. Hamit Çalışkan (A d v i s o r ) L y ■'· Prof.Dr. Bülent Bozkurt (Committee Member) ' ^ 1 Dr. Laurence A. Raw Approved for the Institute of Economics and Social Sciences 1 1 Abstract Justice Delays Revenge- The Spanish Tragedy and Revenge Tradition Erhan Kükner M.A. In English Literature Advisor: Asst.Prof-Dr. Hamit Çalışkan September, 1991 The Spanish Tragedv. one of the best examples of English Renaissance drama, contributed towards the establishment of the revenge tragedy genre, which gained popularity in the years to come. Kyd in this play not only indicates that when the law is unjust, man will resort to revenge; but also demonstrates that a citizen should obey the ruler and regard revenge as a revolt against the state. Tl-is play tells the story of Hieronimo, who expects the murderer^ of his son to be punished. However, Hieronimo gradually discovers that the institutions of justice are useless and therefore takes revenge.
    [Show full text]
  • Revenge Season 4 Episode 3 Recap
    Revenge season 4 episode 3 recap After three seasons of sudsy buildup, the highly anticipated reunion of "Emily Thorne" and David Clarke went down on Revenge this Sunday. Tonight on ABC Revenge returns with an all new Sunday October 12, season 4 episode 3 called "Ashes." On this evening's. And now, Revenge Season 4, Episode 3: “Ashes” The Stowaway burns in Montauk. Jack rushes inside and finds Emily. He gets her out as. type: TV Show; Current Status: In Season; seasons: 4; run date: 09/21/11 In last week's episode, Charlotte tried to burn her sister alive, and in. Abe seeks revenge, but Simcoe will be waiting. genre: Drama; run date: 04/06/14; broadcaster: AMC; seasons: 4; Current Status: In Season. Another day, another pearl- clutching episode of 'Revenge' in which we ate our emotions in the form of lobster rolls. But before we get into. Revenge season 4, episode 3, "Ashes," just finished airing. Read our recap to see what happened with our South Hampton residents this week. Revenge season 4, episode 3 recap: 'Ashes.' David tries to kill Emily, Victoria needs money, Charlotte runs scared, Daniel can't get a job. Season chronology. ← Previous Season 3 · List of Revenge episodes. The fourth and final season of the ABC American television drama series Revenge premiered .. Finally abandoning her persona of Emily, Amanda looks to her future, with this episode looking back over her relationships with those around her, her. Watch Revenge Season 4 Episode 3 Online Recap. Jack arrives at the Stowaway to see it in flames.
    [Show full text]
  • Russia and Turkey: a Cure for Schizophrenia
    RUSSIA AND TURKEY: A CURE FOR SCHIZOPHRENIA DMITRI TRENIN Dmitri Trenin is a senior specialist at the Carnegie Moscow Centre. Russia’s present relations with Turkey can be best described as schizophrenic. On the one hand, the Turks and the Russians have never had such amicable contacts—and on such an order of magnitude— as since the collapse of the Soviet Union. Shuttling small-retail Russian traders have turned Istanbul into a major hub of their commercial operations, whose volume rivals the official commercial turnover between the two countries. Antalya, along with other seaside resorts on the Turkish Mediterranean, has replaced the Crimea as the favourite vacation address for those Russians who can afford to go on holiday. Turkish construction workers are literally giving a new look to Moscow by building new dazzling business headquarters for Russia’s new rich—or rebuilding the seats of political power, such as the State Duma or the once-shelled White House of the government. Thousands of Russian military officers who have returned from Germany and their family members are lucky to reside in modern living quarters built for them by Turkish workers—with Bonn’s money. In a word, the Russians and the Turks have never been intermingling and co-operating so closely, and for so much mutual advantage, in the economic sphere as in the last five or six years. The opposite side of the ledger is almost as disturbing as the first one is encouraging. With the end of the Cold War, the scene appears to be set for a revival of the 400-year-old competition, and even for an advent of something which heretofore had been a marginal factor, namely, a clash of civilisations, Christian Orthodox and Moslem, with Russia and Turkey more or less assigned the mission of chefs de file for the respective sides.
    [Show full text]
  • A Family. Murder. Revenge. the Mob. Bad Blood Was a Canadian Mafia Tale Waiting to Be Told
    A Family. Murder. Revenge. The Mob. Bad Blood was a Canadian mafia tale waiting to be told. How writers Michael Konyves and Simon Barry turned the epic true crime story into a hit series. By Matthew Hays It’s not every day that a writer wakes up to learn that Snoop Dogg has tweeted high praise for their show. Bad Blood scribe Michael Konyves says he’ll never forget it. “I couldn’t quite believe it,” he recalls, sounding like he might still be in shock. “We were certainly glad for the additional attention it brought the show.” That social media hit led to more attention for Bad Blood, the series about Montreal’s legendary Rizzuto Family and the evolution of the city’s 1990s mob scene, with all its associated assassinations and incarcerations. The show, currently in its second season, has proven to be a slow burn, launching in 2017 on Citytv in Canada and FX in the U.S. to solid reviews and respectable numbers. The Toronto Star’s Tony Wong even went as far as to liken it to Cardinal and The Sopranos. That’s definitely not shabby company to keep, but it wasn’t until Netflix began streaming it last December that Bad Blood started gaining real momentum — the aforementioned Snoop Dogg-attracting momentum, to be exact. Simon Barry knew the Rizzuto Family story was meant for the screen when production company New Metric Media approached him with the idea. It had purchased the rights to the acclaimed book Business or Blood: Mafia Boss Vito Rizzuto’s Last War, penned by journalists Antonio Nicaso and Peter Edwards.
    [Show full text]
  • Reverse Engineering Digital Forensics Rodrigo Lopes October 22, 2006
    Reverse Engineering Digital Forensics Rodrigo Lopes October 22, 2006 Introduction Engineering is many times described as making practical application of the knowledge of pure sciences in the solution of a problem or the application of scientific and mathematical principles to develop economical solutions to technical problems, creating products, facilities, and structures that are useful to people. What if the opposite occurs? There is some product that may be a solution to some problem but the inner workings of the solution or even the problem it addresses may be unknown. Reverse engineering is the process of analyzing and understanding a product which functioning and purpose are unknown. In Computer Science in particular, reverse engineering may be defined as the process of analyzing a system's code, documentation, and behavior to identify its current components and their dependencies to extract and create system abstractions and design information. The subject system is not altered; however, additional knowledge about the system is produced. The definition of Reverse Engineering is not peaceful though, especially when it concerns to court and lawsuits. The Reverse Engineering of products protected by copyrighting may be a crime, even if no code is copied. From the software companies’ point of view, Reverse Engineering is many times defined as “Analyzing a product or other output of a process in order to determine how to duplicate the know-how which has been used to create a product or process”. Scope and Goals In the Digital Forensics’ scope, reverse engineering can directly be applied to analyzing unknown and suspicious code in the system, to understand both its goal and inner functioning.
    [Show full text]
  • 245533753-MIT.Pdf
    THE VULNERABILITY OF TECHNICAL SECRETS TO REVERSE ENGINEERING: IMPLICATIONS FOR COMPANY POLICY By Cenkhan Kodak M.S. in Electrical and Computer Systems Engineering (2001) University of Massachusetts at Amherst Submitted to the Systems Design and Management Program In partial fulfillment of the requirements for the degree of Master of Science in Engineering and Management At the MASSACHUSETTS INSTITUTE OF TECHNOLOGY FEBRUARY 2008 © 2008 Cenkhan Kodak. All rights reserved. The author hereby grants to MIT permission to reproduce and Distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created Signature of the Author: m- /7 Systems Desigq and Management Program r\ Ja iry 2008 Certified by: 7 Professoi ,ric von Hippel Thesis Supervisor, MIT mSchgQl o•.Ma genfer t Certified by: MASSACHUSES INSTITUTE= Pat Hale OF TEOHiNOLOGY Director, Systems Design and Management Program MAY 0 6 2008 I-I .a,:IARCHIVES -2- THE VULNERABILITY OF TECHNICAL SECRETS TO REVERSE ENGINEERING: IMPLICATIONS FOR COMPANY POLICY By Cenkhan Kodak Submitted to the Systems Design and Engineering Program On February 04 2008, in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management Abstract In this thesis I will explore the controversial topic of reverse engineering, illustrating with case examples drawn from the data storage industry. I will explore intellectual property rights issues including, users' fair-use provisions that permit reverse engineering. I will also explore the nature of the practice via several types of analyses including: the costs and benefits of reverse engineering; the practical limitations of reverse engineering; and a layered approach to reverse engineering as it applies to complex systems.
    [Show full text]
  • The Revenge of Jenji Kohan
    ThThe Reveevengnge of Jenjnji KoKohanan Smart. Funny. Obsessive. Subversive. How the creator of the hit TV shows Weeds and Orange Is the New Black smoked the doubters and got the last laugh By Paul Hond enji Kohan ’91CC is a rare bird among With the latest season of Orange in the can, the television showrunners: blue-haired and building is quiet today, and Kohan is relaxed. Her female, a punkish Jewish earth mother with private offi ce exudes warmth and comfort, as does a darkly comic vision so basic to her nature Kohan herself. Her hair is the vivid indigo of blue that the goblin of political correctness velvet. Her cat-eye glasses could have been teleported Jshrinks in her presence. As a writer, she is fearless. from a 1962 mahjong game. Objects on her desk She will go there, and keep going. attest to a fondness for thrift-shop fl otsam and novelty “I fi nd the funny in everything, especially the inap- doodads: two Magic 8 Balls, a Weeds condom, and a propriate,” she says. “Maybe it’s my survival technique.” beanbag emblazoned with an unprintable four-letter Kohan’s company, Tilted Productions, is based in word starting with the letter C. central Los Angeles, in a Spanish Colonial–style build- Life wasn’t always this good. “I spent the fi rst part of ing of pink stucco, arched windows, and iron grillwork. my life very frustrated, feeling patronized, and fi ghting Built in 1926 as the Masque Playhouse, it was later injustice, and it doesn’t work when you’re young,” renamed the Hayworth Theatre (legend has it that Kohan says, seated in an armchair with her feet tucked Rita Hayworth’s father once ran a dance studio there).
    [Show full text]
  • October 09, 1944 Record of Meeting at the Kremlin, Moscow, 9 October 1944, at 10 P.M
    Digital Archive digitalarchive.wilsoncenter.org International History Declassified October 09, 1944 Record of Meeting at the Kremlin, Moscow, 9 October 1944, at 10 p.m. Citation: “Record of Meeting at the Kremlin, Moscow, 9 October 1944, at 10 p.m.,” October 09, 1944, History and Public Policy Program Digital Archive, Public Record Office https://digitalarchive.wilsoncenter.org/document/123186 Summary: Churchill, Eden, Stalin, and Molotov discuss the leadership in Poland, Britains interests in Greece and Hong Kong, the actions of Romania and Bulgaria during the war, Turkey, the need for the Great Powers to exert influence on the Balkans to prevent small wars, the leadership of Italy, interests in Bulgaria and Romania, the dividing of Germany and Germany's future, and the American plans in the war against Japan. Original Language: English Contents: English Transcription RECORD OF MEETING AT THE KREMLIN, MOSCOW, 9th OCTOBER, 1944, AT 10 p.m. Present: The Prime Minister. Marshal Stalin. The Secretary of State. M. Molotov. Sir A. Clark Kerr. M. Pavlov. Mr. A Birse. THE PRIME MINISTER gave Marshal Stalin a signed photograph of himself in return for the one sent him some weeks ago by the Marshal. THE PRIME MINISTER hoped they might clear away many questions about which they had been writing to each other for a long time. As time had passed many things had arisen, but they were out of all proportion to the greatness of the common struggle. By talking to each other he and Stalin could avoid innumerable telegrams and letters - and they could give the Ambassador a holiday.
    [Show full text]
  • “Messengers of Justice and of Wrath”: the Captivity
    ―Messengers of Justice and of Wrath‖: The Captivity-Revenge Cycle in the American Frontier Romance A dissertation presented to the faculty of the College of Arts and Sciences of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Brian P. Elliott June 2011 © 2011 Brian P. Elliott. All Rights Reserved. 2 This dissertation titled ―Messengers of Justice and of Wrath‖: The Captivity-Revenge Cycle in the American Frontier Romance by BRIAN P. ELLIOTT has been approved for the Department of English and the College of Arts and Sciences by Paul C. Jones Associate Professor of English Benjamin M. Ogles Dean, College of Arts and Sciences 3 ABSTRACT ELLIOTT, BRIAN P., Ph.D., June 2011, English ―Messengers of Justice and of Wrath‖: The Captivity-Revenge Cycle in the American Frontier Romance Director of Dissertation: Paul C. Jones This project explores the central importance of captivity and revenge to four novels in the genre of frontier romance: Charles Brockden Brown‘s Edgar Huntly (1799), James Fenimore Cooper‘s Last of the Mohicans (1826), Catharine Maria Sedgwick‘s Hope Leslie (1827), and Robert Montgomery Bird‘s Nick of the Woods (1837). Although a fundamental plot aspect of nearly every work in the genre, the threat of captivity and the necessity of revenge are rarely approached as topics of inquiry, despite their deep connection to the structure and action of the texts. Perhaps most importantly, as critics Jeremy Engels and Greg Goodale note, these twin tropes serve as a way of unifying disparate social groups and creating order; in essence, such depictions function as a form of what Michel Foucault terms ―governmentality,‖ logics of control that originate from non-governmental sources but promote systems of governance.
    [Show full text]
  • October 2015
    Walpole Public Library “SIGHTS & SOUNDS” (NEW AUDIO/VISUAL) OCTOBER 2015 DVDs 005.8 RIS Rise of the hackers GOS SEAS.6 Gossip Girl : season 6 Poltergeists : real-life 133.1 POL GRE SEAS.11 Grey’s Anatomy : season 11 hauntings 305.3 GRO Growing up Trans HEL SEAS.1 Helix : season 1 359.83 DES The Destroyers HEL SEAS.4 Hell on wheels : season 4 363.19 MOB Mobilize HOM SEAS.4 Homeland : season 4 364.1323 SEV The Seven Five JAC Jackie & Ryan 551.44 SIN Sinkholes : buried alive LIT NR Little accidents 613.7046 JIL Jillian Michaels Yoga Inferno LOV Love & mercy 639.2 WIC Wicket Tuna : season 4 MAD Mad Max : fury road 781.66 REV Revenge of the Mekons NCI SEAS.12 N.C.I.S. : season 12 791.45 IAM I am Chris Farley ONC SEAS.4 Once upon a time : season 4 Harper Lee : from 813 HAR ORP SEAS.3 Orphan Black : season 3 Mockingbird to Watchman AFF SEAS.1 The affair : season 1 POL Poltergeist ALO Aloha POL SEAS.1 Poldark : season 1 BAT Battleground RES Results BIG SEAS.8 Big bang theory : season 8 REV SEAS.4 Revenge : season 4 [final] BLU SEAS.5 Blue bloods : season 5 ROA The road warrior [1981] BOU Boulevard SCA SEAS.4 Scandal : season 4 BOY The boy next door STI Stir of echoes BRO Broken horses STR SEAS.3 Strike back : season 3 BUR Buried TWO NR Two days, one night CIT City of angels WAL SEAS.5 The walking dead : season 5 CLO NR Closer to the moon GOO SEAS.6 The good wife : season 6 CRI SEAS.10 Criminal minds : season 10 GOS SEAS.5 Gossip Girl : season 5 DVD SET NR Set fire to the stars GOS SEAS.6 Gossip Girl : season 6 EVE Every secret thing GRE SEAS.11 Grey’s Anatomy : season 11 EXT Extinction HEL SEAS.1 Helix : season 1 FAR Far from the madding crowd HEL SEAS.4 Hell on wheels : season 4 FUR7 Furious 7 HOM SEAS.4 Homeland : season 4 GOO SEAS.6 The good wife : season 6 JAC Jackie & Ryan GOS SEAS.5 Gossip Girl : season 5 LIT NR Little accidents Books on CD CASTLE Siren’s call .
    [Show full text]