Genetic algorithm based software code obfuscation operation selection method

A genetic algorithm and software code technology, which is applied in the field of software code obfuscation operation selection based on genetic algorithm, can solve the problems of strong randomness, lack of optimal selection of balance between software code performance and obfuscation degree, etc., and achieve low impact on software performance Effect

Active Publication Date: 2017-08-29
中国航天系统科学与工程研究院
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the article "Control Flow Obfuscation Algorithm Based on Garbage Code", it was proposed that "when the number of operation modules is too large (greater than a certain value M), the Hash function is used to select the operation module and perform obfuscation operations to limit the number of obfuscation operations. It is a method to reduce the time and space overhead after program obfuscation", but this method is relatively random, and it is still lacking in the optimization selection of the balance between software code performance and obfuscation degree

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Genetic algorithm based software code obfuscation operation selection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Such as figure 1 As shown, the present invention proposes a software code obfuscation operation selection method based on genetic algorithm, and the specific steps include:

[0028] (1) Establish a library of obfuscated operation modules, which is composed of obfuscation operations. Obfuscation operations include control flow obfuscation operations, data obfuscation operations, and comprehensive control flow obfuscation and data obfuscation operations. For example, control flow obfuscation operations include adding redundant jumps to the program and reorganizing the control flow in the program, and data obfuscation operations include reorganizing variables and mixing and transforming numeric variables.

[0029] (2) Find the entry of the executable program to be confused and disassemble the executable program to be confused.

[0030] (3) To traverse the code obtained by disassembly, looking for the JUMP, CALL, XOR code among them, as the place where the obfuscation operation i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A genetic algorithm based software code obfuscation operation selection method includes: establishing an obfuscation operation module library; disassembling an executable program to be obfuscated, searching CALL, JUMP and XOR code sections in codes from a code entry, and using the CALL, JUMP and XOR code sections as addition positions of obfuscation operations; randomly selecting a plurality of obfuscation operations from the obfuscation operation module library, combining the obfuscation operations, and forming N obfuscation operation allocation manners; and using the genetic algorithm to perform optimization and screening on the formed N obfuscation operation allocation manners, and acquiring the optimal obfuscation operation allocation manner. The method fully considers the program response time and the code obfuscation degree, can perform screening on code obfuscation operations on the executable program, can improve the program response time on the premise of effective and full obfuscation of software code, and can greatly reduce the influence of program obfuscation on the program execution efficiency.

Description

Technical field [0001] The invention belongs to the technical field of information security, and relates to a method for selecting a software code obfuscation operation based on a genetic algorithm. Background technique [0002] With the rapid development of software reverse engineering, after the software is sold, the possibility of being cracked by unauthorized users has increased. Once an attacker usually uses reverse engineering techniques such as static disassembly or dynamic debugging to analyze and crack the executable program of the software , Then, intellectual property rights such as the core algorithm of the software will be stolen, and the software and filling parameter tables may also be tampered with to seek benefits, and even look for security loopholes in the software for opportunities to use. [0003] Software code obfuscation technology is an effective means to prevent software from being cracked by unauthorized users, and it gradually plays an increasingly import...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06N3/12
CPCG06F21/14G06N3/126
Inventor 王潇茵巴峰张伟葛慧李宁高金梁
Owner 中国航天系统科学与工程研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products