A Code Encrypt Technique Based on Branch Condition Obfuscation

被引:0
|
作者
Geng P. [1 ]
Zhu Y. [1 ]
机构
[1] Strategic Support Force Information Engineering University, Zhengzhou
关键词
Code protection; Conditional code encryption; Lagrange interpolation method; Multi-input branch; Path branch obfuscation;
D O I
10.7544/issn1000-1239.2019.20190368
中图分类号
学科分类号
摘要
Code encryption based on path branch obfuscation of equal condition can make the key be apart from the encrypted program, so this encryption can oppose static and dynamic programming analysis method at the same time, but it can't be used with branches controlled by other comparative relationships. In this paper, using Lagrange interpolation method to produce input-preprocess function, we not only resolve the uniqueness problem of key which produced by multi-inputs of the branch, but also preserve the security of obfuscation on branch conditions, so the conditional code of multi-inputs branch can be encrypted. Using the method which resolves the uniqueness problem of key, code encryption based on equal condition branch obfuscation can be extended to branch of greater-than and less-than condition branch, and complicate condition branch formed by blending of interval condition and equal condition. © 2019, Science Press. All right reserved.
引用
收藏
页码:2183 / 2192
页数:9
相关论文
共 17 条
  • [11] Wang Z., Jia C., Liu W., Et al., Branch obfuscation to combat symbolic execution, Acta Electronica Sinica, 43, 5, pp. 870-878, (2015)
  • [12] Lin H., Zhang X., Ma Y., Et al., Branch obfuscation using binary code side effects, Proc of the 1st Int Conf on Computer, Networks and Communication Engineering (ICCNCE 2013), (2013)
  • [13] Banescu S., Collberg C., Pretschner A., Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning, Proc of the 26th USENIX Security Symposium (USENIX Security 17), pp. 661-678, (2017)
  • [14] Avidan E., Feitelson D.G., From obfuscation to comprehension, Proc of the 23rd Int Conf on Program Comprehension, pp. 178-181, (2015)
  • [15] Yadegari B., Debray S., Symbolic execution of obfuscated code, Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security, pp. 732-744, (2015)
  • [16] Banescu S., Collberg C., Ganesh V., Et al., Code obfuscation against symbolic execution attacks, Proc of the 32nd Annual Conf on Computer Security Applications, pp. 189-200, (2016)
  • [17] Fan J., Xu J., Amma M.H., Et al., Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, 46, 2, pp. 253-272, (2004)