期刊文献+

一种基于垃圾代码的混淆算法研究 被引量:3

Research of Obfuscating Algorithms Based on the Garbage Code
下载PDF
导出
摘要 控制流混淆用于混淆程序的运行流程,从而防止对软件的逆向工程,但通常混淆后的程序在代码量以及执行时间方面都有较大增长.针对不透明谓词难抵挡动态攻击这一弱点,提出了利用"垃圾代码"进行控制流混淆的思路,采用分支垃圾代码和循环垃圾代码算法相结合,并引入了Hash函数以限制代码的插入操作,从而控制代码长度的增长.实验结果表明,该混淆算法能够有效地控制混淆转换带来的性能过载,同时能够有效地防止逆向工程攻击. Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. But the file size and execution time often increase intensively. Because the opaque predicate is difficult to resist the dynamic attacks, the article put forward to make use of "garbage code" to carry out the control flow confusion. The branch garbage code and circulation the garbage code are used in the method and a hash function is introduced here to control the number of insert operation. Our experiments show that aided with the method, ob- fuscation is done efficiently with moderate increases in code size, execution times, while making the obfuscated code resilient to a variety of reverse engineering attacks.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第4期127-130,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60963013 69983003)
关键词 垃圾代码 代码混淆 控制流 逆向工程 garbage code code obfuscation control flow reverse engineering
  • 相关文献

参考文献4

  • 1Dalla Preda M, Giacobazzi R. Semantics-based code obfuscation by abstract interpretation[C].//Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. Stradale Grazia, Italy: Journal of Computer Security, 2009 : 1325-1336.
  • 2Ceccato M,Di Penta M. The effectiveness of source code obfuscation: an Experimental assessment[D]. Italy: University of Sannio,2009.
  • 3Chen H, Yuan L. Control flow obfuscation with information flow tracking[C].//Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture. New York: IEEE, 2009 : 391-400.
  • 4杨乐.用于软件保护的代码混淆技术研究[D].南昌:江西师范大学,2008.

同被引文献27

  • 1袁征,冯雁,温巧燕,张华.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,30(6):103-106. 被引量:9
  • 2Hang JC.Research and implementation of a code obfuscation algorithm based on control flow flattening[D].Xi’an:Northwest University,2010.
  • 3Wang Chenxi.A security architecture for survivability mechanisms[D].Virginia:University of Virginia,2001.
  • 4Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations[R].New Zealand:Department of Computer Science,University of Auckland,1997:1-36.
  • 5Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaque constructs[C]//Proc of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.New York:ACM Press,1998:184-196.
  • 6Collberg C,Thomborson C,Low D.Breaking abstractions and unstructuring data structures[C]//Proc of International Conference on Computer Languages.[S.l.]:IEEE Press,1998:28-38.
  • 7Collberg C,Thomborson C,Low D.Obfuscation techniques for enhancing software security:U.S.,6668325[P].2003-12-23.
  • 8Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10.
  • 9De A R,Van L O.Stealthy obfuscation techniques:misleading the pirates[D].Enschede:Department of Computer Science,University of Twente Enschedc,2003.
  • 10Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[C]//Proc of the 3rd ACM Workshop on Digital Rights Management.New York:ACM Press,2003:142-153.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部