A Method and Implementation of Control Flow Obfuscation Using SEH

被引:6
|
作者
Yao, Xinlei [1 ]
Pang, Jianmin [1 ]
Zhang, Yichi [1 ]
Yu, Yong [1 ]
Lu, Jianping [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
关键词
control flow obfuscation; structured exception handling; callback function; polymorphism;
D O I
10.1109/MINES.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Control flow obfuscation is an important way of software copyright protection; the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we propose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
引用
收藏
页码:336 / 339
页数:4
相关论文
共 50 条
  • [41] Signalling and obfuscation for congestion control
    Marecek, Jakub
    Shorten, Robert
    Yu, Jia Yuan
    INTERNATIONAL JOURNAL OF CONTROL, 2015, 88 (10) : 2086 - 2096
  • [42] An Intermediate Level Obfuscation Method
    Dunaev, Dmitriy
    Lengyel, Laszlo
    ACTA POLYTECHNICA HUNGARICA, 2014, 11 (07) : 179 - 195
  • [43] Obfuscation Method for Location Trajectory
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Miyake, Yutaka
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 7 - 13
  • [44] Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code
    Balachandran, Vivek
    Emmanuel, Sabu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 669 - 681
  • [45] Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation
    Ma, Haoyu
    Li, Ruiqi
    Yu, Xiaoxu
    Jia, Chunfu
    Gao, Debin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2322 - 2337
  • [46] An IP implementation of optimization flow control
    Lapsley, D
    Low, S
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 3023 - 3028
  • [47] IP implementation of optimization flow control
    Lapsley, David
    Low, Steven
    Conference Record / IEEE Global Telecommunications Conference, 1998, 5 : 3023 - 3028
  • [48] Implementation of a robust cruise control using look-ahead method
    Gaspar, Peter
    Nemeth, Balazs
    Basset, Michel
    Orjuela, Rodolfo
    IFAC PAPERSONLINE, 2016, 49 (11): : 505 - 510
  • [49] Sensorless control of a PMSM using an improved implementation of MATSUI's method
    Ane, T.
    Loron, L.
    2008 IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1 AND 2, 2008, : 475 - 480
  • [50] Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs
    Sumathi, G.
    Srivani, L.
    Murthy, D. Thirugnana
    Kumar, Anish
    Madhusoodanan, K.
    SYSTEMS APPROACH TO CYBER SECURITY, 2017, 15 : 143 - 157