Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations

被引:0
|
作者
Su Qing [1 ]
Wang Zhi-yue [1 ]
Wu Wei-min [1 ]
Li Jing-liang [1 ]
Huang Zhi-wei [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
关键词
obfuscation transformations; data flow; control flow;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysis's the obfuscation algorithm's performance of the strength, flexibility, and cost by experimentation. Finally, it discusses the prospect of the research and application of the source code obfuscation technology.
引用
收藏
页码:1093 / 1097
页数:5
相关论文
共 50 条
  • [1] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations
    Wang Zhiyue
    Wu Weimin
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394
  • [2] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742
  • [3] Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code
    Balachandran, Vivek
    Emmanuel, Sabu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 669 - 681
  • [4] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [5] Array Data Transformation for Source Code Obfuscation
    Praveen, S.
    Lal, P. Sojan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 420 - +
  • [6] Control flow obfuscation technology based on random insertion
    Sun, Yongyong (yongsunjd@126.com), 1600, Universidad Central de Venezuela (55):
  • [7] Software protection algorithm based on control flow obfuscation
    Sun Y.
    Sun, Yongyong (yongsunjd@126.com), 2018, Totem Publishers Ltd (14) : 2181 - 2188
  • [8] Technique of Code Obfuscation Based on Class Structure
    Sun Yongyong
    Huang Guangqiu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 674 - 678
  • [9] Technique of Code Obfuscation Based on Class Splitting
    Sun Yongyong
    Huang Guangqiu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 636 - 640
  • [10] Implicit Code Obfuscation Technique Based on Code Slice Fusion
    Yu P.
    Shu H.
    Xiong X.-B.
    Kang F.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1650 - 1665