A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator

被引:0
|
作者
Yao, Xue [1 ]
Li, Bin [1 ]
Sun, Yahong [1 ]
机构
[1] Syst Engn Res Inst, 1 FengXian East Rd, Beijing, Peoples R China
关键词
D O I
10.1007/978-981-10-7605-3_111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of embedded devices in daily life, the gap of hardware configuration is gradually narrowing, more and more differentiated functions are realized by software. How to effectively protect the intellectual property rights of software becomes very important. Software security issues of embedded software include reverse-engineering, malicious modifications and tampering. At present, most of the pure software protection solution is relatively simple, the protective effect of which is not desirable, while the hardware solutions have non-negligible costs. In this paper we discuss a user-defined code reinforcement technique based on LLVM-Obfuscator. Data and control flow transformation techniques are added based on the common code obfuscation techniques, and Hardware reinforcement solution is simulated by software. So that it does not increase the cost, but has better protective effect than ordinary software.
引用
收藏
页码:688 / 694
页数:7
相关论文
共 50 条
  • [1] xVMP: An LLVM-based Code Virtualization Obfuscator
    Xiao, Xuangan
    Wang, Yizhuo
    Hu, Yikun
    Gu, Dawu
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING, SANER, 2023, : 738 - 742
  • [2] Research Based on LLVM Code Obfuscation Technology
    Lv, Di
    Zhao, Liang
    Chen, Bin
    [J]. 2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 163 - 167
  • [3] Study on a user-defined and low cost fieldbus technology
    Zibo Vocational Institute, Zibo 255000 Shandong, China
    不详
    [J]. Lect. Notes Electr. Eng., 2013, VOL. 4 (737-743):
  • [4] Towards a Cost Model to Optimize User-Defined Functions in an ETL Workflow Based on User-Defined Performance Metrics
    Ali, Syed Muhammad Fawad
    Wrembel, Robert
    [J]. ADVANCES IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2019, 2019, 11695 : 441 - 456
  • [5] A Case Study of User-Defined Code Transformations for Data Layout Optimizations
    Yamada, Takeshi
    Hirasawa, Shoichi
    Takizawa, Hiroyuki
    Kobayashi, Hiroaki
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 535 - 541
  • [6] The significance of user-defined identifiers in java source code authorship identification
    Department of Information and Communication Systems Engineering, University of the Aegean, Samos, 83200, Greece
    不详
    不详
    [J]. Comput Syst Sci Eng, 2 (123-132):
  • [7] A Customizable Auto-Tuning Scenario with User-defined Code Transformations
    Takizawa, Hiroyuki
    Sato, Daichi
    Hirasawa, Shoichi
    Takahashi, Daisuke
    [J]. 2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1372 - 1378
  • [8] Decomposing user-defined tasks in a reinforcement learning setup using TextWorld
    Petsanis, Thanos
    Keroglou, Christoforos
    Kapoutsis, Athanasios Ch.
    Kosmatopoulos, Elias B.
    Sirakoulis, Georgios Ch.
    [J]. FRONTIERS IN ROBOTICS AND AI, 2023, 10
  • [9] Vectorization-aware Loop Optimization with User-defined Code Transformations
    Takizawa, Hiroyuki
    Reimann, Thorsten
    Komatsu, Kazuhiko
    Soga, Takashi
    Egawa, Ryusuke
    Musa, Akihiro
    Kobayashi, Hiroaki
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 685 - 692
  • [10] A User-Defined Code Transformation Approach to Overlapping MPI Communication with Computation
    Hayashi, Yasuharu
    Takizawa, Hiroyuki
    Kobayashi, Hiroaki
    [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 508 - 514