A Method and Implementation of Control Flow Obfuscation Using SEH

被引:6
|
作者
Yao, Xinlei [1 ]
Pang, Jianmin [1 ]
Zhang, Yichi [1 ]
Yu, Yong [1 ]
Lu, Jianping [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
关键词
control flow obfuscation; structured exception handling; callback function; polymorphism;
D O I
10.1109/MINES.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Control flow obfuscation is an important way of software copyright protection; the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we propose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
引用
收藏
页码:336 / 339
页数:4
相关论文
共 50 条
  • [1] Control Flow Obfuscation Based Protection Method for Android Applications
    Peng, Yong
    Su, Guanyu
    Tian, Bin
    Sun, Maohua
    Li, Qi
    CHINA COMMUNICATIONS, 2017, 14 (11) : 247 - 259
  • [2] Control Flow Obfuscation Based Protection Method for Android Applications
    Yong Peng
    Guanyu Su
    Bin Tian
    Maohua Sun
    Qi Li
    中国通信, 2017, 14 (11) : 247 - 259
  • [3] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
    Xu, Dongpeng
    Ming, Jiang
    Wu, Dinghao
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 323 - 342
  • [4] Compiling method for obfuscation technology based on crossing control-flow
    Fu J.-J.
    Wang K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
  • [5] Control flow obfuscation for Android applications
    Balachandran, Vivek
    Sufatrio
    Tan, Darell J. J.
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2016, 61 : 72 - 93
  • [6] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [7] Mode-based Obfuscation using Control-Flow Modifications
    Koteshwara, Sandhya
    Kim, Chris H.
    Parhi, Keshab K.
    PROCEEDINGS OF THE THIRD WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2016), 2016, : 19 - 24
  • [8] Control Flow Obfuscation Using Neural Network to Fight Concolic Testing
    Ma, Haoyu
    Ma, Xinjie
    Liu, Weijie
    Huang, Zhipeng
    Gao, Debin
    Jia, Chunfu
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 287 - 304
  • [9] Program obfuscation scheme using random numbers to complicate control flow
    Toyofuku, T
    Tabata, T
    Sakurai, K
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 916 - 925
  • [10] Progressive Control Flow Obfuscation for Android Applications
    Zhang, Li
    Meng, Huasong
    Thing, Vrizlynn L. L.
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1075 - 1079