• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2012, Vol. 34 ›› Issue (1): 79-85.

• 论文 • Previous Articles     Next Articles

A Program FlowSensitive SelfModifying Code Obfuscation Method

HE Yanxiang,CHEN Yong,WU Wei,CHEN Nian,XU Chao,LIU Jianbo,SU Wen   

  1. (State Key Lab of Software Engineering,
    School of Computer Science,Wuhan University,Wuhan 430072,China)
  • Received:2010-05-20 Revised:2010-10-26 Online:2012-01-25 Published:2012-01-25

Abstract:

Selfmodifying code obfuscation is an effective technique to hide the important information of programs. In this paper, we focus on reducing the cost of obfuscated codes and enhancing the degree of obfuscation to use a flowsensitive method to select the obfuscated codes that are important relatively such as control instruction and propose a twostep comparing obfuscation model that can locate the obfuscated instructions in binary codes precisely that can help change these codes to illegal codes to defense the disassembly. The model contains two parts. The first part uses the flowsensitive analyses to get the obfuscated instructions and generate two obfuscated codes and one obfuscated code mapping file. Then, the second part compares these two obfuscated codes to generate the final obfuscated codes containing the illegal instruction codes based on the obfuscated code mapping file. Through the experiments, the obfuscated instructions are about 3% of the whole codes and the disassemble codes are much different with the source codes and even some error instructions appear.

Key words: program flowsensitive;selfmodifying codes;code obfuscation;binary codes location;code protection