Software protection algorithm based on control flow obfuscation

被引:0
|
作者
Sun Y. [1 ]
机构
[1] School of Computer Science and Engineering, Xi'an Technological University, Xi'an
关键词
Control flow obfuscation; Nested complexity; Obfuscation strengthh; Packet knapsack; Random insertion;
D O I
10.23940/ijpe.18.09.p27.21812188
中图分类号
学科分类号
摘要
Control flow confusion is a software protection technique. There is uncertainty of obfuscation strength and extra cost by using the traditional garbage code control flow obfuscation algorithm. To solve this problem, a control flow obfuscation algorithm based on nested complexity is proposed. The cost introduced by obfuscation is calculated quantitatively, and the complexity of control flow is measured by nested complexity. The knapsack decision table is constructed based on the idea of packet knapsack. Considering the obfuscation strength and the cost, the garbage code insertion point is selected, and the obfuscation strength is increased as much as possible within the cost threshold. The results show that the obfuscation strength of the algorithm in this paper is higher than that of the control flow obfuscation algorithm using the traditional random insertion strategy. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2181 / 2188
页数:7
相关论文
共 50 条
  • [41] A Method and Implementation of Control Flow Obfuscation Using SEH
    Yao, Xinlei
    Pang, Jianmin
    Zhang, Yichi
    Yu, Yong
    Lu, Jianping
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 336 - 339
  • [42] Exploring compiler optimization space for control flow obfuscation
    Ahmed, Hameeza
    Hyder, Muhammad Faraz
    ul Haque, Muhammad Fahim
    Santos, Paulo Cesar
    COMPUTERS & SECURITY, 2024, 139
  • [43] Exploring compiler optimization space for control flow obfuscation
    Ahmed, Hameeza
    Hyder, Muhammad Faraz
    Haque, Muhammad Fahim ul
    Santos, Paulo Cesar
    Computers and Security, 2024, 139
  • [44] Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code
    Balachandran, Vivek
    Emmanuel, Sabu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 669 - 681
  • [45] Parameterized decomposition tree-based obfuscation method with double flattening control flow
    Zhou, Na-Qin
    Qi, De-Yu
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2015, 43 (05): : 132 - 138
  • [46] Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation
    Wang, Pei
    Bao, Qinkun
    Wang, Li
    Wang, Shuai
    Chen, Zhaofeng
    Wei, Tao
    Wu, Dinghao
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 26 - 36
  • [47] Forensic and Software (UN) Obfuscation
    Desnos, Anthony
    Vanderbeken, Eloi
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
  • [48] Hopes, Fears, and Software Obfuscation
    Barak, Boaz
    COMMUNICATIONS OF THE ACM, 2016, 59 (03) : 88 - 96
  • [49] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    Cybersecurity, 3
  • [50] Methods and Software for the Program Obfuscation
    Shevtsova, O. O.
    Buintsev, D. N.
    SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115