Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations

被引:0
|
作者
Su Qing [1 ]
Wang Zhi-yue [1 ]
Wu Wei-min [1 ]
Li Jing-liang [1 ]
Huang Zhi-wei [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
关键词
obfuscation transformations; data flow; control flow;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysis's the obfuscation algorithm's performance of the strength, flexibility, and cost by experimentation. Finally, it discusses the prospect of the research and application of the source code obfuscation technology.
引用
收藏
页码:1093 / 1097
页数:5
相关论文
共 50 条
  • [31] Control flow driven splitting of loop nests at the source code level
    Falk, H
    Marwedel, P
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, PROCEEDINGS, 2003, : 410 - 415
  • [32] Exploring compiler optimization space for control flow obfuscation
    Ahmed, Hameeza
    Hyder, Muhammad Faraz
    ul Haque, Muhammad Fahim
    Santos, Paulo Cesar
    COMPUTERS & SECURITY, 2024, 139
  • [33] Exploring compiler optimization space for control flow obfuscation
    Ahmed, Hameeza
    Hyder, Muhammad Faraz
    Haque, Muhammad Fahim ul
    Santos, Paulo Cesar
    Computers and Security, 2024, 139
  • [34] Function Level Control Flow Obfuscation for Software Security
    Balachandran, Vivek
    Keong, Ng Wee
    Emmanuel, Sabu
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 133 - 140
  • [35] A Control Flow Protection Method Based on Code Extraction
    Li Y.-G.
    Chung Y.-C.
    Zheng Y.-J.
    Lin G.-Y.
    Bao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (06): : 1372 - 1392
  • [36] Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis
    Yin X.
    Lu B.
    Cai R.
    Zhu X.
    Yang Q.
    Liu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (02): : 326 - 340
  • [37] Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
    Al-Hakimi, Asma'a Mahfoud Hezam
    Sultan, Abu Bakar Md
    Abdul Ghani, Abdul Azim
    Ali, Norhayati Mohd
    Admodisastro, Novia Indriaty
    IEEE ACCESS, 2020, 8 (08) : 187326 - 187342
  • [38] Parameterized decomposition tree-based obfuscation method with double flattening control flow
    Zhou, Na-Qin
    Qi, De-Yu
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2015, 43 (05): : 132 - 138
  • [39] Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation
    Ma, Haoyu
    Li, Ruiqi
    Yu, Xiaoxu
    Jia, Chunfu
    Gao, Debin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2322 - 2337
  • [40] A framework for quantitative evaluation of parallel control-flow obfuscation
    Huang, Yu-Lun
    Tsai, Hsin-Yi
    COMPUTERS & SECURITY, 2012, 31 (08) : 886 - 896