期刊文献+

基于变形的二进制代码混淆技术研究 被引量:5

Research on Deformation Based Binary Code Obfuscation Technology
下载PDF
导出
摘要 二进制代码保护技术不受源码语言约束,适用性更广。结合等价变形、控制流混淆、动态加解密等技术,研究并实现了二进制代码混淆保护原型系统MEPE。在MEPE中,基于拆分或替换指令的操作,以及算术和逻辑等价式,设计等价变形规则及对应的等价变形模板函数,对二进制代码进行等价变形。通过理论分析,证明了变形的多样性效果;利用控制流混淆对变形后代码块进行"切片乱序",由地址跳转表管理跳转地址,并通过动态加解密对其进行保护;深入分析循环体中被保护指令对时间开销的影响,提出了与指令循环深度相关联的迭代次数与切片粒度的计算方法。MEPE具有保护强度可调节、功能可扩展、保护效果多样、性能消耗低等特点。通过实验分析迭代次数、切片粒度对时间消耗的影响,验证了对循环体中被保护指令控制的作用和意义,以及保护效果的多样性。经过MEPE处理后的二进制代码在时间损耗较小的情况下,可有效增加攻击者静态和动态分析的难度,提高了二进制可执行代码的安全性。 A binary code protection system, named MEPE, was developed. In MEPE, some functions were designed to substitute an o- riginal instruction with a functional equivalent sequence of instructions. Theoretical analysis showed that the binary code protected with this method would have diverse appearances. After deformation, the protected codes were fragmented into small snippets which were connected through jump instructions. The destination addresses of these jump instructions were managed by an address table, and the table itself was protected by the technique of dynamic eneryption and decryption. Based on the analysis of the impact of instructions in loops on execution time , a tuning method was proposed to balance the effect of protection and time overhead. The experimental results and the analyses showed that the tuning method is effective and the protected codes are much more resistant to static and dynamic analysis.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2014年第1期14-21,共8页 Journal of Sichuan University (Engineering Science Edition)
基金 教育部科学技术研究重点项目资助(211181) 教育部博士点基金资助项目(20106101110018) 国家科技支撑计划资助项目(2013BAK01B02) 国家自然科学基金资助项目(61070176 61170218 61272461 61202393) 陕西省科技攻关项目(2011K06-07 2012K06-17) 陕西省科技计划资助项目(2011K06-09) 陕西省教育厅产业化培育项目(2011jg06) 陕西省自然科学基础研究计划资助项目(2012JQ8049)
关键词 二进制代码混淆 迭代变形 变形引擎 多样性 binary code obfuscation iterative transform metamorphic engine diversity
  • 相关文献

参考文献13

  • 1Chow S,Eisen P,Johnson H. A white-box DES implementation for DRM applications[A].Berlin:Springer,2003.1-15.
  • 2Kanzaki Y,Monden A,Nakamura M. Exploiting selfmodification mechanism for program protection[A].Dallas,USA:IEEE,2003.170-179.
  • 3Kanzaki Y,Monden A,Nakamura M. Program camouflage:A systematic instruction hiding method for protecting secrets[J].World Acedemy of Science Engineering and Technology,2008,(09):509-515.
  • 4Kanzaki Y,Monden A. A software protection method based on time-sensitive code and self-modification mechanism[A].Anaheim:ACTA Press,2010.325-331.
  • 5Madou M,Anckaert B,Moseley P. Software protection through dynamic code mutation[J].Information Security Applications,2006.194-206.
  • 6Wu Y,Zhao Z,Chui T. An attack on SMC-based software protection[J].Information and Communications Security,2006.352-368.
  • 7Dux B,Iyer A,Debray S. Visualizing the behavior of dynamically modifiable code[A].Washington DC:IEEE Computer Society Press,2005.337-340.
  • 8Birrer B D,Raines R A,Baldwin R O. Program fragmentation as a metamorphic software protection[A].Washington DC:IEEE Computer Society,2007.369-374.
  • 9Oreans Technologies Corporation. Code virtualizer[EB/OL].http://www.oreans.com/codevirtualizer.php,2013,2013.
  • 10Collberg C,Thomborson C,Low D. A taxonomy of obfuscating transformations[R].New Zealand:The University of Auckland,1997.1173-3500.

同被引文献61

  • 1Falcarin P,et al.Guest editors' introduction:software protection[J].IEEE Software,2011,28(2):24-27.
  • 2The Compliance Gap:BSA Global Software Survey[EB/OL].Washington,DC:BSA,June 2014[2014-08-01].http://globalstudy.bsa.org/2013/downloads/studies/2013GlobalSurvey_Study_en.pdf.
  • 3Eighth Annual BSA and IDC Global Software Piracy Study[EB/OL].Washington,DC:BSA,2011[2013-01-26].http://portal.bsa.org/globalpiracy2010/downloads/study_pdf/2010_BSA_Piracy_Study-Standard.pdf.
  • 4King J.Symbolic execution and program testing[J].Communications of the ACM,1976,19(7):385-394.
  • 5Newsome J,Song D.Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software.Proceedings of the Network and Distributed System Security Symposium[C].Rosten,VA:Internet Society,2005.
  • 6Ganesh V,Dill D.A decision procedure for bit-vectors and arrays.Proceedings of International Conference on Computer Aided Verification[C].Berlin:Springer,2007.519-531.
  • 7Nethercote N,Seward J.Valgrind:a framework for heavyweight dynamic binary instrumentation.Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation[C].New York:ACM,2007.89-100.
  • 8Wang C,Davidson J,Hill J,et al.Protection of software-based survivability mechanisms.Proceedings of the International Conference on Dependable Systems and Networks[C].Piscataway,NJ:IEEE,2001.193-202.
  • 9Linn C,Debray S.Obfuscation of executable code to improve resistance to static disassembly.Proceedings of ACM Conference on Computer and Communication Security[C].New York,NY:ACM,2003.290-299.
  • 10Myles G,Collberg C.Software watermarking via opaque predicates:implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171.

引证文献5

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部