A method of code obfuscation using Markov chain

A Markov chain and code obfuscation technology, applied in the field of computer security, can solve the problems of code obfuscation, the first crack of the competition team, and the difficulty of software cracking, etc., to achieve the effect of slowing down the speed and realizing the protection.

Inactive Publication Date: 2018-02-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Patent application "Compilation method and system for code obfuscation through assembly" (Application No.: CN201310258325) provides a code obfuscation compilation method and system, which solves the problem that system calls cannot be hidden under the Android ARM platform, and the core technology is easily competed by disassembly The problem that the team leader cracks, thus increasing the difficulty of the software being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of code obfuscation using Markov chain
  • A method of code obfuscation using Markov chain
  • A method of code obfuscation using Markov chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] This specific embodiment provides a method for implementing code obfuscation by using a Markov chain, which specifically includes the following steps:

[0034] Step 1. Obfuscate the constant string; for the constant string A to be obfuscated in the program source code, perform the following steps:

[0035] Step 1-1: Randomly select one of the preset encryption methods as the encryption method for the constant string A; among them, the preset encryption method needs to satisfy symmetric encryption, that is, when the program is running, the obfuscated The character string is restored to the original character string, such as the XOR encryption method; this step should occur during the program compilation process, that is, it will not affect the operating efficiency of the program;

[0036] Step 1-2: Use a time-based pseudo-random number algorithm to generate a random number K, and the value K is used as the key used in the encryption method selected in step 1-1 to partici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing code obfuscation by utilizing a Markov chain, which belongs to the field of computer security. In the compilation stage of the program source code, the present invention encrypts the constant character string in the code to make it unrecognizable in the disassembly, and at the same time, generates irrelevant execution instructions by inserting the Markov chain code before the function call, namely By calling the protected function after several state transitions, the function confusion in the running memory is realized, and then the protection of software or special code fragments is realized. The invention can effectively confuse constant character strings and function addresses, greatly increasing the difficulty of analyzing programs in reverse engineering.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a method for realizing code obfuscation by using a Markov chain. Background technique [0002] In recent years, with the advancement of information technology, a large number of excellent software and APPs have been produced on the market, and they provide many convenient functions. However, due to the characteristics of the platform and language, these software can be easily cracked by reverse engineering to obtain highly readable source code (especially the Android platform and JAVA language). Once cracked, not only will the author's intellectual property rights be directly violated, but there is also the risk of adding malicious code after being cracked, threatening the security and privacy of ordinary users. This is a very serious security issue. [0003] Generally speaking, using reverse engineering to restore the high-level semantics of a binary file includes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14G06F2221/2107
Inventor 张小松宋珺牛伟纳卓中流陈瑞东王东陈厅许云清黄金戴中印
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products