Software protection algorithm based on control flow obfuscation

被引:0
|
作者
Sun Y. [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an Technological University, Xi'an
关键词
Control flow obfuscation; Nested complexity; Obfuscation strengthh; Packet knapsack; Random insertion;
D O I
10.23940/ijpe.18.09.p27.21812188
中图分类号
学科分类号
摘要
Control flow confusion is a software protection technique. There is uncertainty of obfuscation strength and extra cost by using the traditional garbage code control flow obfuscation algorithm. To solve this problem, a control flow obfuscation algorithm based on nested complexity is proposed. The cost introduced by obfuscation is calculated quantitatively, and the complexity of control flow is measured by nested complexity. The knapsack decision table is constructed based on the idea of packet knapsack. Considering the obfuscation strength and the cost, the garbage code insertion point is selected, and the obfuscation strength is increased as much as possible within the cost threshold. The results show that the obfuscation strength of the algorithm in this paper is higher than that of the control flow obfuscation algorithm using the traditional random insertion strategy. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2181 / 2188
页数:7
相关论文
共 50 条
  • [1] Control Flow Obfuscation Based Protection Method for Android Applications
    Peng, Yong
    Su, Guanyu
    Tian, Bin
    Sun, Maohua
    Li, Qi
    CHINA COMMUNICATIONS, 2017, 14 (11) : 247 - 259
  • [2] Control Flow Obfuscation Based Protection Method for Android Applications
    Yong Peng
    Guanyu Su
    Bin Tian
    Maohua Sun
    Qi Li
    中国通信, 2017, 14 (11) : 247 - 259
  • [3] A Parameterized Flattening Control Flow Based Obfuscation Algorithm with Opaque Predicate for Reduplicate Obfuscation
    Liang, Zheheng
    Li, Wenin
    Guo, Jing
    Qi, Deyu
    Zeng, Jijun
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 372 - 378
  • [4] Hidden Path: Dynamic Software Watermarking Based on Control flow Obfuscation
    Chen, Zhe
    Jia, Chunfu
    Xu, Donghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 443 - 450
  • [5] Embedded Software Security through Key-Based Control Flow Obfuscation
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 30 - +
  • [6] Function Level Control Flow Obfuscation for Software Security
    Balachandran, Vivek
    Keong, Ng Wee
    Emmanuel, Sabu
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 133 - 140
  • [7] BossPro: a biometrics-based obfuscation scheme for software protection
    Kuseler, Torben
    Lami, Ihsan A.
    Al-Assam, Hisham
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [8] Software Protection with Increased Complexity and Obfuscation
    Tsui, Frank
    Duggins, Sheryl
    Karam, Orlando
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [9] Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation
    Ma, Haoyu
    Li, Ruiqi
    Yu, Xiaoxu
    Jia, Chunfu
    Gao, Debin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2322 - 2337
  • [10] Three control flow obfuscation methods for Java']Java software
    Hou, T. W.
    Chen, H. Y.
    Tsai, M. H.
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86