期刊文献+

基于同余方程和改进的压扁控制流的混淆算法 被引量:2

Obfuscating algorithm based on congruence equation and improved flat control flow
下载PDF
导出
摘要 针对现有控制流混淆算法的混淆结果单一的问题,提出了一种基于同余方程和改进的压扁控制流混淆算法。首先,使用密钥和一组同余方程来生成源代码的基本块中需要使用的不透明谓词;其次,基于Logistic混沌映射提出了一种新的N态不透明谓词构造算法,并将其应用到现有的压扁控制流算法中,对现有的压扁控制流算法进行改进;最后,将上述两个对源码进行混淆的算法结合,以此来增加源代码中控制流的复杂度,使其更难被破解。与现有的基于混沌不透明谓词的压扁控制流算法相比,所提混淆算法使混淆后代码的防篡改攻击时间平均提高了22%以上,总圈复杂度平均提高了34%以上。实验结果表明,所提算法能够保证混淆后程序执行结果的正确性并且具有很高的圈复杂度,能够有效地抵抗静态攻击和动态攻击。 Aiming at the simple obfuscating result of the existing control flow obfuscating algorithm, an obfuscating algorithm based on congruence equation and improved flat control flow was presented. First of all, a kind of opaque predicate used in the basic block of the source code was created by using secret keys and a group of congruence equation. Then, a new algorithm for creating N-state opaque predicate was presented based on Logistic chaotic mapping. The proposed algorithm was applied to the existing flat control flow algorithm for improving it. Finally, according to the combination of the above two proposed algorithms for obfuscating the source code, the complexity of the flat control flow in the code was increased and make it more difficult to be cracked. Compared with the flat control flow algorithm based on chaotic opaque predicate, the code's tamper-proof attack time of the obfuscated code was increased by above 22% on average and its code's total cyclomatic complexity was improved by above 34% on average by using the proposed obfuscating algorithm. The experimental results show that, the proposed algorithm can guarantee the correctness of execution result of the obfuscated program and has a high cyclomatic complexity, so it can effectively resist static and dynamic attacks.
出处 《计算机应用》 CSCD 北大核心 2017年第6期1803-1807,共5页 journal of Computer Applications
基金 安徽省自然科学基金资助项目(1408085MKL06) 高等学校学科创新引智计划项目(B07033)~~
关键词 代码混淆 N态不透明谓词 同余方程 压扁控制流算法 code obfuscation N-State opaque predicate congruence equation flat control flow algorithm
  • 相关文献

参考文献6

二级参考文献65

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2王继成.一元多项式环中的孙子定理[J].杭州师范学院学报(自然科学版),2006,5(4):313-314. 被引量:2
  • 3高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 4Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 5Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 6Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 7Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].
  • 8Barak B,Goldreich O,Impagliazzo R,Rudich S,Sahai A,Vadhan SP,Yang K.On the(im)possibility of obfuscating programs.In:Kilian J,ed.Proc.of the 21st Annual Int’l Cryptology Conf.on Advances in Cryptology(CRYPTO 2001).Santa Barbara:Springer-Verlag,2001.1-18.
  • 9Appel A.Deobfuscation is in NP.2002.http://www.cs.princeton.edu/~appel/papers/deobfus.pdf.
  • 10Preda M,Giacobazzi R.Semantic-Based code obfuscation by abstract interpretation.In:Proc.of the ICALP.2005.[doi:10.1007/11523468_107].

共引文献58

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部