Font Size: a A A

Research On Control Flow Obfuscation Technology Based On Binary Code

Posted on:2014-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2268330401463260Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
All along, software piracy, intellectual property infringement issues are important issues plaguing global IT development, and are also one of the major unresolved problem in the field of computer information security. By more and more attention to the security of the software source code, and a variety of security measures has been considerable development in these years. Code obfuscation technology is one of the very effective protection strategies. This paper proposed an effective resistance to the program dynamic and static analysis of control flow obfuscation algorithms from the angle of code obfuscation, and so designed a target code obfuscation model system.This paper first introduces the reverse engineering concept, and then several widely in software protection, leads to a new type of software protection strategy, which is code obfuscation technology. Next, the article describes the classification of code obfuscation and analyzes several cutting-edge control flow obfuscation algorithms, including insertion the opaque predicates technology and control flow flattening technology. Research shows the current code obfuscation technology by comparison the strengths and weaknesses of these algorithms. Malicious analysts, on the other hand, in order to reap huge profits, but also actively engaged in the study of anti-obfuscation technology. The attack strategy against confusion technology constantly emerging, and poses a grave threat to the security of the software. Existing control flow obfuscation algorithms in terms confuse strength and security aspects are significantly lagging behind the development of the anti-obfuscation technology. By fully exploiting the existing control flow obfuscation technology weaknesses and shortcomings, this article proposes an enhanced flat control flow obfuscation algorithm. This method can resist program static analysis and dynamic analysis of two aspects of the software to provide more comprehensive protection.Finally, this article designs of a binary code obfuscation system which uses the enhanced flat control flow obfuscation algorithm. This system is based on the binary instruction level to protect the program, while reducing the threshold for code obfuscation technology. The article focuses on some of the core components of this system, including the design of the disassembly engine, build function call relationship graph, as well as the relocation table.
Keywords/Search Tags:reverse engineering, code obfuscation, disassemble
PDF Full Text Request
Related items