Font Size: a A A

The Code Obfuscation System Based On Control Obfuscation And Layout Obfuscation

Posted on:2018-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2348330512982621Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology and computer software industry,it makes the access and use of software easier.Now,a lot of software are cracked by the attacker and published to the network for people to use free of charge.When the software is cracked,the attacker may steal the core code or important information.It is difficult to protect the software intellectual property and limit the rapid development of the software industry.Recently,due to the concise and clear of the grammar of the Python language and the powerful and rich class library,it will improve the efficiency of the development of software developers.Increasing code is developed by the Python language.Due to the Python bytecode is easy to crack by the existing decompiler,the key information will be stolen easily.In order to solve the above problem,more current code obfuscation techniques have been researched.A Python code obfuscation system is designed on the basis of layout obfuscation and control obfuscation.The Python code obfuscation system can increase the attacker's difficulty to crack the Python code.The main work is as follows:(1)Analyzing the code obfuscation techniques:Firstly we introduced the layout obfuscation,the data obfuscation,the preventive obfuscation,the control obfuscation which is contained in code obfuscation,and providing the specific methods.Then,describing four code obfuscation's evaluation criteria which will be used to evaluate the Python code obfuscation system.(2)Analyzing the algorithm of the opaque predicate and flat control flow,this be-longs to the control obfuscation.Firstly,analyzing the existing problem of the chaotic mapping of Logistic and En Logistic,and providing the chaotic mapping of segmenta-tion Logistic which has overcome the shortcomings of non-sensitive to the initial value and the phenomenon of a group together in a small area and will be used in the Python code obfuscation system.Then,introducing the definition of the opaque predicate,and providing a method of creating opaque predicate using chaotic mapping.In the end,we intended to analyze the shortcoming of the algorithm of the current flat control flow.(3)Implementing the designed Python code obfuscation system;firstly,introduc-ing the layout obfuscation used in this obfuscation system.Secondly,providing two new algorithms which are creating opaque predicts based on the congruence equation and creating N-States opaque predicate based on the chaotic mapping of segmentation Logistic,and analyzing several methods of insertion of the opaque predicate.Then,we have offered a new and improved algorithm of flat control flow,which overcomes the weakness of the current flat control flow algorithm.Finally,implementing the algo-rithm of the layout obfuscation and the control obfuscation introduced before.(4)The next key research objective is making the experiment and analysis on the designed Python code obfuscation system.Initially we intended to experiment and an-alyze the given platform using the open source code and making the analysis of the correctness,security and validity of the code obfuscation system.The result of the ex-periment shows that the algorithm of the layout obfuscation and the control obfuscation used in the Python code obfuscation system can ensure the correctness of the obfus-cated code.It can achieve a good balance as compared with the current algorithm of the opaque predicate creation.It reduces time overhead when compute the output of the opaque predicate.At the same time,it has a higher performance on safety,potency,resilience and imperceptibility.So,it can increase the attacker's difficulty to crack the Python code.But,it also brings some time overhead and space overhead.
Keywords/Search Tags:code obfuscation, layout obfuscation, control obfuscation, N-States opaque predicate, congruence equation, flat control flow
PDF Full Text Request
Related items