Stealthy Code Obfuscation Technique for Software Security

被引:10
|
作者
Darwish, Saad M. [1 ]
Guirguis, Shawkat K. [1 ]
Zalat, Mohamed S. [1 ]
机构
[1] Univ Alexandria, Inst Grad Studies & Res, Alexandria, Egypt
关键词
Malicious reverse engineering; Code obfuscation; Software security;
D O I
10.1109/ICCES.2010.5674830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating transformations that conceal the control flow of the program in conjunction with obfuscation techniques employed by viruses in commercial side software to achieve the power of virus's hiding with the aim of improving the quality of overall obfuscation and the protection of intellectual property. This work utilizes an IF statement mechanism as a way to construct inexpensive and stealthy opaque predicates. Experimental results indicate that significant portions of source code that have been obfuscated using the proposed technique are disassembled incorrectly, thereby protecting the functionality of the codes.
引用
收藏
页码:93 / 99
页数:7
相关论文
共 50 条
  • [1] A SOFTWARE FRAMEWORK FOR CODE SECURITY USING M-COT-METRICS BASED CODE OBFUSCATION TECHNIQUE
    Senthilkumar, R.
    Thangavelu, Arunkumar
    [J]. JURNAL TEKNOLOGI, 2016, 78 (02): : 73 - 81
  • [2] A Security Model and Implementation of Embedded Software Based on Code Obfuscation
    Yi, Jiajia
    Chen, Lirong
    Zhang, Haitao
    Li, Yun
    Zhao, Huanyu
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613
  • [3] Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering
    Gnatyuk, Sergiy
    Kinzeryavyy, Vasyl
    Stepanenko, Iryna
    Gorbatyuk, Yana
    Gizun, Andrii
    Kotelianets, Vitalii
    [J]. ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 571 - 580
  • [4] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    [J]. Cybersecurity, 3
  • [5] On the concept of software obfuscation in computer security
    Kuzurin, Nikolay
    Shokurov, Alexander
    Varnovsky, Nikolay
    Zakharov, Vladimir
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 281 - +
  • [6] Novel obfuscation algorithms for software security
    Ertaul, L
    Venkatesh, S
    [J]. SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 209 - 215
  • [7] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [8] Assessing the Security Properties of Software Obfuscation
    Xu, Hui
    Lyu, Michael R.
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 80 - 83
  • [9] Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
    Al-Hakimi, Asma'a Mahfoud Hezam
    Sultan, Abu Bakar Md
    Abdul Ghani, Abdul Azim
    Ali, Norhayati Mohd
    Admodisastro, Novia Indriaty
    [J]. IEEE ACCESS, 2020, 8 (08) : 187326 - 187342
  • [10] On the Impact of Code Obfuscation to Software Energy Consumption
    Bunse, Christian
    [J]. FROM SCIENCE TO SOCIETY: NEW TRENDS IN ENVIRONMENTAL INFORMATICS, 2018, : 239 - 249