A Code Encrypt Technique Based on Branch Condition Obfuscation

被引:0
|
作者
Geng P. [1 ]
Zhu Y. [1 ]
机构
[1] Strategic Support Force Information Engineering University, Zhengzhou
关键词
Code protection; Conditional code encryption; Lagrange interpolation method; Multi-input branch; Path branch obfuscation;
D O I
10.7544/issn1000-1239.2019.20190368
中图分类号
学科分类号
摘要
Code encryption based on path branch obfuscation of equal condition can make the key be apart from the encrypted program, so this encryption can oppose static and dynamic programming analysis method at the same time, but it can't be used with branches controlled by other comparative relationships. In this paper, using Lagrange interpolation method to produce input-preprocess function, we not only resolve the uniqueness problem of key which produced by multi-inputs of the branch, but also preserve the security of obfuscation on branch conditions, so the conditional code of multi-inputs branch can be encrypted. Using the method which resolves the uniqueness problem of key, code encryption based on equal condition branch obfuscation can be extended to branch of greater-than and less-than condition branch, and complicate condition branch formed by blending of interval condition and equal condition. © 2019, Science Press. All right reserved.
引用
收藏
页码:2183 / 2192
页数:9
相关论文
共 17 条
  • [1] Schrittwieser S., Katzenbeisser S., Kieseberg P., Et al., Covert computation: Hiding code in code for obfuscation purposes, Proc of the 8th ACM SIGSAC Symp on Information, Computer and Communications Security, pp. 529-534, (2013)
  • [2] Balachandran V., Emmanuel S., Potent and stealthy control flow obfuscation by stack based self-modifying code, IEEE Transactions on Information Forensics and Security, 8, 4, pp. 669-681, (2013)
  • [3] Cappaert J., Preneel B., Anckaert B., Et al., Towards tamper resistant code encryption: Practice and experience, Proc of the 4th Int Conf on Information Security Practice and Experience, pp. 86-100, (2008)
  • [4] Wu Z., Steven G., Xie M., Et al., Mimimorphism: A new approach to binary code obfuscation, Proc of the 17th ACM Conf on Computer and Communications Security (CCS'12), pp. 536-546, (2012)
  • [5] Vrba Z., Cryptexec: Next-generation runtime binary encryption using on-demand function extraction
  • [6] Vrba Z., Halvorsen P., Griwodz C., Program obfuscation by strong cryptography, Proc of 2010 Int Conf on Availability, Reliability and Security, pp. 242-247, (2010)
  • [7] Cappaert J., Kisserli N., Schellekens D., Et al., Self-encrypting code to protect against analysis and tampering, Proc of the 1st Benelux Workshop on Information and Sytem Security (WISSec 2006), (2006)
  • [8] Balachandran V., Keong N.W., Emmanuel S., Function level control flow obfuscation for software security, Proc of the 8th Int Conf on Complex, Intelligent and Software Intensive Systems, pp. 133-140, (2014)
  • [9] Sharif M., Lanzi A., Giffin J., Et al., Impeding malware analysis using conditional code obfuscation, Proc of the Network and Distributed System Security Symp., pp. 321-333, (2008)
  • [10] Jia C., Wang Z., Liu X., Et al., Branch obfuscation: An efficient binary code obfuscation to impede symbolic execution, Journal of Computer Research and Development, 48, 11, pp. 2111-2119, (2011)