The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm

被引:0
|
作者
Yang Yubo [1 ]
Fan Wenqing [2 ]
Huang Wei [2 ]
Xu Guoai [1 ]
Yang Yixian [1 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Commun Univ China, Sch Comp Sci, Beijing 100024, Peoples R China
[3] Beijing Inst Graph Commun, Sch Informat Engn, Beijing 102600, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Code Obfuscation; Complicated Control Flow; Opaque Predicate; Point Function;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
On the algorithm of code obfuscation, opaque predicate is used to confuse the judgment of the program branches to achieve complex control flow statement. Currently, there are problems of obfuscation on the opaque predicate. The first problem is the isolation. the relation between opaque predicate is relatively isolated, once an opaque predicates Boolean value is obtained, the branch flow will always be identified; Second is the reversible, an attacker can determine the opaque predicate the Boolean value by analyzing reversible slicing attacks. In this paper, we proposed multi-point function opaque predicate obfuscation algorithm, using multi-function features makes opaque predicates interdependent and avoid reversible slicing attacks. Experimental data demonstrates that the obfuscated program performance and security has been significantly improved.
引用
收藏
页码:3063 / 3070
页数:8
相关论文
共 50 条
  • [1] On the use of opaque predicates in mobile agent code obfuscation
    Majumdar, A
    Thomborson, C
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 648 - 649
  • [2] Improved generic acceptance function for Multi-point Metropolis algorithm
    Zhang, Yinghua
    Zhang, Wensheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
  • [3] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
    Xu, Dongpeng
    Ming, Jiang
    Wu, Dinghao
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 323 - 342
  • [4] Algorithm Research Based on Multi-point Locating for Compliant Part
    Zhang Hong-shuang
    Ji Ai-min
    ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 2: MODELLING AND SIMULATION IN ENGINEERING, 2010, : 80 - 83
  • [5] Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
    Dolz, Daniel
    Parra, Gerardo
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2008, 8 (02): : 71 - 77
  • [6] On the properties of device-free multi-point CSI localization and its obfuscation
    Cominelli, Marco
    Gringoli, Francesco
    Lo Cigno, Renato
    COMPUTER COMMUNICATIONS, 2022, 189 : 67 - 78
  • [7] Multi-Point to Multi-Point Traffic Engineering
    Chaitou, Mohamad
    Le Roux, Jean-Louis
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 382 - 390
  • [8] Secant algorithm in multi-point contact machining
    Wang, Ruiqiu
    Chen, Wuyi
    Jixie Gongcheng Xuebao/Chinese Journal of Mechanical Engineering, 2006, 42 (07): : 203 - 206
  • [9] Multi-point to Multi-point MIMO in Wireless LANs
    Yun, Sangki
    Qiu, Lili
    Bhartia, Apurv
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 125 - 129
  • [10] Research progress and application of multi-point forming
    Li Hui-min
    Guo Wei-gang
    ADVANCED POLYMER SCIENCE AND ENGINEERING, 2011, 221 : 679 - 683