期刊文献+

基于非线性模糊矩阵的代码混淆有效性评估模型 被引量:4

Code Obfuscation Effectiveness Assessment Model Based on Nonlinear Fuzzy Matrices
下载PDF
导出
摘要 为了解决目前代码混淆评估方法对代码混淆效果区分度不高的问题,文中提出一种基于非线性模糊矩阵的代码混淆有效性评估模型MNLFM(Code Obfuscation Effective Assessment Model Based on Nonlinear Fuzzy Matrices),并证明了MNLFM具有评估合理性、单调递增性、连续性和突出性等特性。MNLFM可以明显改善当前代码混淆评估领域在混淆效果方面可区分性差的现状。通过量化评估指标、确定隶属函数和构造非线性模糊矩阵等方法进行建模。建立一个Java程序测试用例集,基于压扁控制流和多种不透明谓词代码混淆技术对此模型进行混淆有效性检验,并将其与其他代码混淆评估模型进行比较。实验结果验证了MNLFM可以比较混淆后代码之间的综合复杂度,并明确区分不同混淆算法对原代码的混淆程度。 In order to solve the problem of present code obfuscation assessment method for low level of the code obfuscation discrimination,this paper proposed a code obfuscation effectiveness assessment model based on nonlinear fuzzy matrices(MNLFM),and gave a proof of several MNLFM’s features,such as assessing rationality,monotonicity,continuity,highlighting.MNLFM can obviously improve the current situation of poor distinction in the field of obfuscation assessment.The model can be carried out by quantifying the assessment index parameters,determining the membership functions and constructing the nonlinear fuzzy matrices.A test case suite of Java program was set up and several code obfuscation technologies based on flatten control flow and opaque predicate were used to check the validation of the model.And then it was compared with other code obfuscation assessment models.The experimental results verify that MNLFM can compare the comprehensive complexity between the obfuscation codes and clearly distinguish the degree of different obfuscation algorithms for original code.
作者 苏庆 林泽明 林志毅 黄剑锋 SU Qing;LIN Ze-ming;LIN Zhi-yi;HUANG Jian-feng(School of Computers,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机科学》 CSCD 北大核心 2019年第4期197-202,共6页 Computer Science
基金 国家自然科学基金(61572142) 广东省自然科学基金(2017A030310013 2018A030313389) 广东省科技计划(2016B030306004 2016A010101027) 广州市科技计划(201604016041)资助
关键词 代码混淆评估模型 非线性模糊矩阵 突出性 代码混淆算法 Code obfuscation assessment model Nonlinear fuzzy matrices Highlight Code obfuscation algorithms
  • 相关文献

参考文献5

二级参考文献62

  • 1李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 2孙瑛,陈广桐.模糊数学方法在湖泊水质评价中的应用[J].山东工业大学学报,1994,24(2):154-158. 被引量:35
  • 3高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 4Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 5Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 6Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 7Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].
  • 8Barak B,Goldreich O,Impagliazzo R,Rudich S,Sahai A,Vadhan SP,Yang K.On the(im)possibility of obfuscating programs.In:Kilian J,ed.Proc.of the 21st Annual Int’l Cryptology Conf.on Advances in Cryptology(CRYPTO 2001).Santa Barbara:Springer-Verlag,2001.1-18.
  • 9Appel A.Deobfuscation is in NP.2002.http://www.cs.princeton.edu/~appel/papers/deobfus.pdf.
  • 10Preda M,Giacobazzi R.Semantic-Based code obfuscation by abstract interpretation.In:Proc.of the ICALP.2005.[doi:10.1007/11523468_107].

共引文献109

同被引文献29

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部