Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations

被引:0
|
作者
Su Qing [1 ]
Wang Zhi-yue [1 ]
Wu Wei-min [1 ]
Li Jing-liang [1 ]
Huang Zhi-wei [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
关键词
obfuscation transformations; data flow; control flow;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysis's the obfuscation algorithm's performance of the strength, flexibility, and cost by experimentation. Finally, it discusses the prospect of the research and application of the source code obfuscation technology.
引用
收藏
页码:1093 / 1097
页数:5
相关论文
共 50 条
  • [21] Compiling method for obfuscation technology based on crossing control-flow
    Fu J.-J.
    Wang K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
  • [22] Android Control Flow Obfuscation Based on Dynamic Entry Points Modification
    Yang, Xueyi
    Zhang, Lingchen
    Ma, Cunqing
    Liu, Zongbin
    Peng, Ping
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 296 - 303
  • [23] Control Flow Obfuscation via CPS Transformation
    Lu, Kenny Zhuo Ming
    PROCEEDINGS OF THE 2019 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION (PEPM '19), 2019, : 54 - 60
  • [24] CFHider: Control Flow Obfuscation with Intel SGX
    Wang, Yongzhi
    Shen, Yulong
    Su, Cuicui
    Cheng, Ke
    Yang, Yibo
    Faree, Anter
    Liu, Yao
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 541 - 549
  • [25] Hidden Path: Dynamic Software Watermarking Based on Control flow Obfuscation
    Chen, Zhe
    Jia, Chunfu
    Xu, Donghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 443 - 450
  • [26] Embedded Software Security through Key-Based Control Flow Obfuscation
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 30 - +
  • [27] Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits
    Zamiri Azar, Kimia
    Kamali, Hadi Mardani
    Roshanisefat, Shervin
    Homayoun, Houman
    Sotiriou, Christos P.
    Sasan, Avesta
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (04) : 643 - 656
  • [28] Control Flow Obfuscation Scheme for LLVM Intermediate Languages
    Li, Chengyang
    Huang, Tianbo
    Chen, Xiarun
    Wen, Weiping
    Computer Engineering and Applications, 2023, 59 (08): : 263 - 269
  • [29] A Method and Implementation of Control Flow Obfuscation Using SEH
    Yao, Xinlei
    Pang, Jianmin
    Zhang, Yichi
    Yu, Yong
    Lu, Jianping
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 336 - 339
  • [30] Control flow driven splitting of loop nests at the source code level
    Falk, H
    Marwedel, P
    Catthoor, F
    EMBEDDED SOFTWARE FOR SOC, 2003, : 215 - 229