Supercharge Your Innovation With Domain-Expert AI Agents!

Program control flow deep confusion method based on labels

A deep and tagged technology, applied in the field of deep obfuscation of program control flow, can solve the problems of in-depth program control flow analysis, poor program performance, program confusion, etc., achieve good obfuscation effect, low overhead, and improve security and privacy effects

Inactive Publication Date: 2010-11-17
FUDAN UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here we take the program control flow obfuscation technology based on the horizontal expansion of control flow with the best performance as an example. If 80% of the control flow of the program is obfuscated, it will bring more than 5 times the performance overhead, that is, the obfuscated program Only 1 / 5 of the performance of the original program
In addition to the problem that the performance of the obfuscated program is much worse than the original program, the above technologies cannot achieve deep program obfuscation, because they are all "control flow insensitive". The control flow insensitivity mentioned here is mainly It means that these technologies do not need to rely on their own program control flow when obfuscating the control flow of the program. A specific manifestation is that these technologies can independently confuse any function in the program without confusing other functions.
This obfuscation technique that is not sensitive to control flow has a significant problem, because in reverse engineering, it is generally only necessary to find the most useful algorithm in the original program or just find one of the loopholes to attack, and this control flow is not sensitive The confusion makes it possible to analyze its core algorithm during reverse engineering, thus greatly reducing the cost of reverse engineering. Therefore, this paper believes that these technologies cannot really achieve in-depth program control flow analysis.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program control flow deep confusion method based on labels
  • Program control flow deep confusion method based on labels
  • Program control flow deep confusion method based on labels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0017] Such as image 3 As shown, an unconditional jump instruction is confused with the program instruction on the right. The semantics of the original program is to jump the processor's PC value to the address of L1. The obfuscated program instructions actually complete the same function, let's analyze its execution process in detail.

[0018] First, during the execution of the program, a data with a mark is assigned to the register R5, and then R5 propagates the mark to R3 along with the execution of the program. We can see that R3 is also a marked register. Then, as mentioned above in the summary of the invention, there will be a difference in CPU processing between marked data and unmarked data. R3, the marked data, is used as a memory address for reading, and will An exception will occur. At this time, because of the exception, the program wil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer software safety and intellectual property protection, in particular to a program control flow deep confusion method based on labels. The method comprises the following steps of: secretly generating labeled data, and spreading labels along with the execution of a program. In the execution process of the program, the labels can also be dynamically deleted and increased. Since the labels are hidden in the execution process of the program, the actual execution process of the program is changed. A confusing device can also be automatically inserted with some new indicators to change and spread the labels so that the execution flows of the labels are very difficult to analyze. In the invention, paths which can not be truly executed can also be inserted with codes resulting in the change of control flows. The invention realizes program control flow deep confusion with low performance overhead and greatly improves the safety and the secrecy of the program.

Description

technical field [0001] The invention belongs to the technical field of computer software security and intellectual property protection, and in particular relates to a method for deep obfuscation of program control flow. Background technique [0002] With the birth of software, the reverse engineering of software was also born. Here, reverse engineering is relative to the normal program development process. The normal program development process refers to the process of converting the high-level expression form (source code) of the program to the low-level expression form (executable file), which is the process of program compilation that we often refer to. figure 1 The left half lists the specific steps of this conversion: first, the program is converted from the form of source code to the form of abstract syntax tree by the precompiler, and then the compiler converts the abstract syntax tree into the program control flow graph, The control flow graph can reflect the speci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/14
Inventor 陈海波袁立威臧斌宇
Owner FUDAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More