期刊文献+

基于分支函数的混淆技术研究 被引量:1

Research on Obfuscation Technique Based on Branch Functions
下载PDF
导出
摘要 静态反汇编是对程序进行逆向工程的第一步,它将程序的可执行机器码以汇编指令代码的形式表示,给盗用软件知识产权和发掘软件漏洞提供了可能。为了混淆静态反汇编过程,增加对程序进行反汇编的难度,本文深入研究基于分支函数的静态反汇编混淆技术,针对其隐蔽性较差和代码执行效率低下的缺点,提出一种改进的分支函数静态反汇编混淆技术。改进后的混淆技术不仅能够有效地隐藏程序中的跳转指令,提高了代码的执行效率,同时增加了软件逆向工程分析的难度。 The process of reverse engineering is an executable program typically begins with static disassembly that translates machine code to assembly code,which creates opportunities for theft of intellectual property and discoveries of vulnerabilities of the program.In order to disrupt the static disassembly process so as to make programs harder to disassemble correctly,after a deep research on the static disassembly obfuscation technique based on branch functions and its weakness on invisibility and code execution speed,this paper proposes an improved obfuscation technique based on branch functions which not only can hide the jump instructions efficiently but also enhance the code execution speed,and make the analysis of reverse engineering more difficult at the same time.
出处 《计算机与现代化》 2012年第2期168-170,179,共4页 Computer and Modernization
关键词 逆向工程 混淆技术 静态反汇编 分支函数 reverse engineering obfuscation technique static disassembly branch functions
  • 相关文献

参考文献13

  • 1Christopher Kruegel,William Robertson, Fredrik Valeur. Static Disassembly of Obfuscated Binaries [ D]. California:University of California ,2004.
  • 2Cullen Linn, Saumya Debray. Obfuscation of executable code to improve resistance to static disassembly[ C]//Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003:290-299.
  • 3吴金波,蒋烈辉.反静态反汇编技术研究[J].计算机应用,2005,25(3):623-625. 被引量:5
  • 4许敏,陈前斌.静态反汇编算法研究[J].计算机与数字工程,2007,35(5):13-16. 被引量:7
  • 5岳峰,庞建民,赵荣彩,白莉莉.反汇编过程中call指令后混淆数据的识别[J].计算机工程,2010,36(7):144-146. 被引量:3
  • 6Matthias Jacb,Mariusz H Jakubowski, Ramarathnam V. Towards integral binary execution implementing oblivious hashing using overlapped instruction encodings [ C ]//Proceedings of the 9th Workshop on Multimedia & Security. 2007 : 129-140.
  • 7吴金波,蒋烈辉,赵鹏.基于控制流的静态反汇编算法研究[J].计算机工程与应用,2005,41(30):89-90. 被引量:9
  • 8Zhang Xue-sang, He Feng-ling, Zuo Wan-li. An inter-classes obfuscation method for Java program [ C ]//Proceedings of the 2nd International Conference on Information Security and Assurance. 2008:360-365.
  • 9Lakhotia A,Kumar E U, Venable M. A method of detecting obfuscated calls in malicious binaries [ J ]. IEEE Transactions on Software Engineering,2005,31 ( 11 ) :955-967.
  • 10Schwarz B, Debray S, Andrews G. Disassemble of executable code revisited[ C ]//Proceedings of the 9th Working Conference on Reverse Engineering. 2002:45-54.

二级参考文献41

  • 1谷伟,侯成君.MCS-51智能反汇编软件的设计与实现[J].微电子学与计算机,1993,10(10):21-24. 被引量:2
  • 2吴金波,蒋烈辉.反静态反汇编技术研究[J].计算机应用,2005,25(3):623-625. 被引量:5
  • 3吴金波,蒋烈辉,赵鹏.基于控制流的静态反汇编算法研究[J].计算机工程与应用,2005,41(30):89-90. 被引量:9
  • 4肖正文,张江陵,胡学骏,贾连兴.代码与数据分离的反汇编程序设计[J].计算机工程与应用,1996,32(5):33-35. 被引量:3
  • 5BENJAMIN S,DEBRAY S,GREGORY A. Disassembly of executable code revisited[ C]//Proc of the 9th Working Conference on Reverse Engineering. Washington DC:IEEE Computer Society, 2002:45.
  • 6CIFUENTES C, GOUGH K J. Decompilation of binary programs[ J]. Software-Practice and Experience,1995,25(7) :811-829.
  • 7HSIEH W C, ENGLER D, BACK G. Reverse-engineering instruction encodings [ C ]//Proc of USENIX Annual Technical Conference. Berkeley : USENIX Association,2001 : 133- 145.
  • 8CIFUENTES C, FRABOULET A. Intraprocedural static slicing of binary executables [ C ]//Proc of International Conference on Software Maintenance. Washington DC:IEEE Computer Society,1997:188.
  • 9WILLIAM F Z. Concepts and techniques in software watermarking and obfuscation [ D ]. New Zealand: The University of Auckland, 2007.
  • 10BARAK B,GOLDREICH O,IMPAGLIAZZO R, et al. On the (Im) possibility of obfuscating programs [ C ]//Proc of the 21st Annual International Cryptology Conference, California. London : Springer-Verlag, 2001:1- 18.

共引文献25

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部