A Method and Implementation of Control Flow Obfuscation Using SEH

被引:6
|
作者
Yao, Xinlei [1 ]
Pang, Jianmin [1 ]
Zhang, Yichi [1 ]
Yu, Yong [1 ]
Lu, Jianping [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
关键词
control flow obfuscation; structured exception handling; callback function; polymorphism;
D O I
10.1109/MINES.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Control flow obfuscation is an important way of software copyright protection; the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we propose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
引用
收藏
页码:336 / 339
页数:4
相关论文
共 50 条
  • [31] A novel method of using a control valve for measurement and control of flow
    Atmanand, MA
    Konnur, MS
    JOINT CONFERENCE - 1996: IEEE INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE & IMEKO TECHNICAL COMMITTEE 7, CONFERENCE PROCEEDINGS, VOLS I AND II: QUALITY MEASUREMENTS: THE INDISPENSABLE BRIDGE BETWEEN THEORY AND REALITY (NO MEASUREMENTS? NO SCIENCE!), 1996, : 813 - 816
  • [32] A novel method of using a control valve for measurement and control of flow
    Atmanand, MA
    Konnur, MS
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 1999, 48 (06) : 1224 - 1226
  • [33] THE DESIGN AND IMPLEMENTATION OF A MEDICAL INJECTION SYSTEM PROVIDING SENSITIVE FLUID FLOW CONTROL USING MECHATRONICS DESIGN METHOD
    Ersoy, Sezgin
    Yilmaz, Ozgur
    ACTA TECHNICA NAPOCENSIS SERIES-APPLIED MATHEMATICS MECHANICS AND ENGINEERING, 2019, 62 (04): : 551 - 556
  • [34] Embedded Software Security through Key-Based Control Flow Obfuscation
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 30 - +
  • [35] Identifying the Applied Obfuscation Method towards De-obfuscation
    Sagisaka, Hayato
    Tamada, Haruaki
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 873 - 878
  • [36] Design and implementation of PID based flow rate control using PLC
    Shaikh, Muhammad Zakir
    Hussain, Majid
    Kumar, Dileep
    Memon, Fayaz Ahmed
    Rustam, Babar
    Baro, Enrique Nava
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2023, 42 (04) : 115 - 122
  • [37] On the Implementation of Location Obfuscation in openwifi and Its Performance
    Ghiro, Lorenzo
    Cominelli, Marco
    Gringoli, Francesco
    Lo Cigno, Renato
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [38] Software obfuscation on a theoretical basis and its implementation
    Ogiso, T
    Sakabe, Y
    Soshi, M
    Miyaji, A
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01) : 176 - 186
  • [39] Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation
    Banescu, Sebastian
    Ochoa, Martin
    Kunze, Nils
    Pretschner, Alexander
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 149 - 156
  • [40] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742