Username   Password       Forgot your password?  Forgot your username? 


Software Protection Algorithm based on Control Flow Obfuscation

Volume 14, Number 9, September 2018, pp. 2181-2188
DOI: 10.23940/ijpe.18.09.p27.21812188

Yongyong Sun

School of Computer Science and Engineering, Xian Technological University, Xian, 710032, China

(Submitted on May 28, 2018; Revised on June 30, 2018; Accepted on August 12, 2018)


Control flow confusion is a software protection technique. There is uncertainty of obfuscation strength and extra cost by using the traditional garbage code control flow obfuscation algorithm. To solve this problem, a control flow obfuscation algorithm based on nested complexity is proposed. The cost introduced by obfuscation is calculated quantitatively, and the complexity of control flow is measured by nested complexity. The knapsack decision table is constructed based on the idea of packet knapsack. Considering the obfuscation strength and the cost, the garbage code insertion point is selected, and the obfuscation strength is increased as much as possible within the cost threshold. The results show that the obfuscation strength of the algorithm in this paper is higher than that of the control flow obfuscation algorithm using the traditional random insertion strategy.


References: 10

                1. A. Pretschner, “Code Obfuscation Against Symbolic Execution Attacks” in Proceedings of Conference on Computer Security Applications (ACM), pp. 189-200, December 2016
                2. M. Ceccato, M. D. Penta , and P. Falcarin, “A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques,” Empirical Software Engineering, Vol. 19, No. 4, pp. 1040-1074, 2014
                3. A. Viticchie, L. Regano, and M. Torchiano, “Assessment of Source Code Obfuscation Techniques” in Proceedings of International Working Conference on Source Code Analysis and Manipulation, pp.11-20, October 2016
                4. M. L. Shao, D. Y. Qi, and W. J. Liu, “Polymorphic Inline Code Obfuscation Algorithm,” Application Research of Computers, Vol. 32, No. 6, pp. 1787-1790, 2015
                5. Z. Wang, C. F. Jia, and W. J. Liu, “Branch Obfuscation to Combat Symbolic Execution,” Acta Electronica Sinica, Vol. 43, No. 5, pp. 870-878, 2015
                6. Y. Y. Sun and G. Q. Huang, “ A Control Flow Obfuscation Scheme based on Garbage Code,” Journal of Theoretical & Applied Information Technology, Vol. 46, No. 1, pp. 284-288, 2013
                7. D. M. Chen, X. H. Fan, and J. Zhu, “Obfuscation Algorithms based on Congruence equation and Chinese Remainder Theorem,” Application Research of Computers, Vol. 32, No. 2, pp. 485-488, 2015
                8. Q. Su, W. M. Wu, and Z. L. Li, “Research and Application of Chaos Opaque Predicate in Code Obfuscation,” Computer Science, Vol. 40, No. 6, pp. 155-159, 2013
                9. H. Jiang, Y. LIu, and X. Wang, “Code Confusion Technology Research based on Control Flow,” Application Research of Computers, Vol. 30, No.3, pp. 897-899, 2013
                10. X. Xie, F. L. Liu, and B. Lu, “Quantitative Evaluation for Effectiveness of Code Obfuscation based on Multi-Level Weighted Attributes,” Computer Science, Vol. 42, No. 3, pp. 167-173, 2015


                              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                              This site uses encryption for transmitting your passwords.