Software protection algorithm based on control flow obfuscation

被引:0
|
作者
Sun Y. [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an Technological University, Xi'an
关键词
Control flow obfuscation; Nested complexity; Obfuscation strengthh; Packet knapsack; Random insertion;
D O I
10.23940/ijpe.18.09.p27.21812188
中图分类号
学科分类号
摘要
Control flow confusion is a software protection technique. There is uncertainty of obfuscation strength and extra cost by using the traditional garbage code control flow obfuscation algorithm. To solve this problem, a control flow obfuscation algorithm based on nested complexity is proposed. The cost introduced by obfuscation is calculated quantitatively, and the complexity of control flow is measured by nested complexity. The knapsack decision table is constructed based on the idea of packet knapsack. Considering the obfuscation strength and the cost, the garbage code insertion point is selected, and the obfuscation strength is increased as much as possible within the cost threshold. The results show that the obfuscation strength of the algorithm in this paper is higher than that of the control flow obfuscation algorithm using the traditional random insertion strategy. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2181 / 2188
页数:7
相关论文
共 50 条
  • [21] Control flow obfuscation for Android applications
    Balachandran, Vivek
    Sufatrio
    Tan, Darell J. J.
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2016, 61 : 72 - 93
  • [22] Protection against Code Obfuscation Attacks based on control dependencies in Android Systems
    Graa, Mariem
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Cavalli, Ana
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 149 - 157
  • [23] Mode-based Obfuscation using Control-Flow Modifications
    Koteshwara, Sandhya
    Kim, Chris H.
    Parhi, Keshab K.
    PROCEEDINGS OF THE THIRD WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2016), 2016, : 19 - 24
  • [24] Compiling method for obfuscation technology based on crossing control-flow
    Fu J.-J.
    Wang K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
  • [25] Android Control Flow Obfuscation Based on Dynamic Entry Points Modification
    Yang, Xueyi
    Zhang, Lingchen
    Ma, Cunqing
    Liu, Zongbin
    Peng, Ping
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 296 - 303
  • [26] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations
    Wang Zhiyue
    Wu Weimin
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394
  • [27] Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms
    Hataba, Muhammad
    Sherif, Ahmed
    Elkhouly, Reem
    IEEE ACCESS, 2022, 10 : 33943 - 33953
  • [28] Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering
    Gnatyuk, Sergiy
    Kinzeryavyy, Vasyl
    Stepanenko, Iryna
    Gorbatyuk, Yana
    Gizun, Andrii
    Kotelianets, Vitalii
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 571 - 580
  • [29] Eternal War in Software Security: A Survey of Control Flow Protection
    Tang, Bowen
    Ying, Huan
    Wang, Wei
    Tang, Huabin
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 716 - 725
  • [30] Progressive Control Flow Obfuscation for Android Applications
    Zhang, Li
    Meng, Huasong
    Thing, Vrizlynn L. L.
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1075 - 1079