Software protection algorithm based on control flow obfuscation

被引:0
|
作者
Sun Y. [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an Technological University, Xi'an
关键词
Control flow obfuscation; Nested complexity; Obfuscation strengthh; Packet knapsack; Random insertion;
D O I
10.23940/ijpe.18.09.p27.21812188
中图分类号
学科分类号
摘要
Control flow confusion is a software protection technique. There is uncertainty of obfuscation strength and extra cost by using the traditional garbage code control flow obfuscation algorithm. To solve this problem, a control flow obfuscation algorithm based on nested complexity is proposed. The cost introduced by obfuscation is calculated quantitatively, and the complexity of control flow is measured by nested complexity. The knapsack decision table is constructed based on the idea of packet knapsack. Considering the obfuscation strength and the cost, the garbage code insertion point is selected, and the obfuscation strength is increased as much as possible within the cost threshold. The results show that the obfuscation strength of the algorithm in this paper is higher than that of the control flow obfuscation algorithm using the traditional random insertion strategy. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2181 / 2188
页数:7
相关论文
共 50 条
  • [31] Control Flow Obfuscation via CPS Transformation
    Lu, Kenny Zhuo Ming
    PROCEEDINGS OF THE 2019 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION (PEPM '19), 2019, : 54 - 60
  • [32] CFHider: Control Flow Obfuscation with Intel SGX
    Wang, Yongzhi
    Shen, Yulong
    Su, Cuicui
    Cheng, Ke
    Yang, Yibo
    Faree, Anter
    Liu, Yao
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 541 - 549
  • [33] A Tutorial on Software Obfuscation
    Banescu, Sebastian
    Pretschner, Alexander
    ADVANCES IN COMPUTERS, VOL 108, 2018, 108 : 283 - 353
  • [34] A Breakthrough in Software Obfuscation
    Barak, Boaz
    COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 112 - 112
  • [35] Information theory-based software metrics and obfuscation
    Kirk, SR
    Jenkins, S
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 72 (02) : 179 - 186
  • [36] Obfuscation Algorithm Design Based on Fully Homomorphism
    Pan, Zhao
    Zhang, Yue-Jun
    Wang, Jia-Wei
    Wang, Peng-jun
    2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2018, : 266 - 268
  • [37] Research on Code Obfuscation Based on Maze Protection Technology
    Wang, Zhiyue
    Wu, Weimin
    Ma, Wenrui
    Li, Jinliang
    Huang, Zhiwei
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
  • [38] An obfuscation-based approach for location privacy protection
    College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    J. Comput. Inf. Syst., 2013, 24 (9781-9789):
  • [39] Invertible Image Obfuscation for Facial Privacy Protection via Secure Flow
    Yuan, Lin
    Liang, Kai
    Pu, Xiao
    Zhang, Yan
    Leng, Jiaxu
    Wu, Tao
    Wang, Nannan
    Gao, Xinbo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (07) : 6077 - 6091
  • [40] Control Flow Obfuscation Scheme for LLVM Intermediate Languages
    Li, Chengyang
    Huang, Tianbo
    Chen, Xiarun
    Wen, Weiping
    Computer Engineering and Applications, 2023, 59 (08): : 263 - 269