Code obfuscation method and device based on chaotic opaque predicates

A code obfuscation and transparent technology, applied in the direction of program/content distribution protection, etc., can solve the problem of low versatility

Active Publication Date: 2017-12-05
GUANGDONG UNIV OF TECH
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it is only limited to a chaotic map, and its versatility is not high
Moreover, both algorithms 3 and 4 only give the security proof of the chaotic opaque predicate and the selection method of the key, without involving the specific construction process of the opaque predicate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method and device based on chaotic opaque predicates
  • Code obfuscation method and device based on chaotic opaque predicates
  • Code obfuscation method and device based on chaotic opaque predicates

Examples

Experimental program
Comparison scheme
Effect test

example

[0083]

[0084]

[0085]Collberg et al. first proposed opaque predicates based on the difficulty of alias analysis and concurrency analysis. The two construction methods of opaque predicates increase the difficulty of deciphering opaque predicates to a certain extent. Then Arboit used the quadratic remainder theory to construct opaque predicates, and combined software digital watermarking technology to design a Java program watermarking scheme based on opaque predicates, but after analysis and evaluation verification, the cryptographic security of this scheme was not good; later Yuan Zheng proposed to use congruence equations in elementary number theory to construct opaque predicates, which are more superior in terms of security and cost than the quadratic remainder method. Anirban Majumdar et al. proposed a new method that combines the open problem of distributed global state detection with the well-known hard composition problem to make opaque predicates to solve the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code obfuscation method and device based on chaotic opaque predicates. By adopting the scheme, the capability of resisting static analysis is strong through a chaotic opaque expression of a complicated structure mapped chaotically, the efficiency is higher, and a chaotic opaque expression of any value can be constructed, so that the method and the device is more convenient and safer during code obfuscation. The technology of constructing chaotic opaque predicates through the chaotic opaque expression and a number theory expression has the convenience of constructing opaque predicates of the number theory expression and also has the safety of resisting static attack of the chaotic opaque expression, so that the whole construction of the opaque predicates is more convenient and safer. In addition, according to the scheme, an algorithm framework of the opaque expression is constructed through chaotic mapping and secondary mapping combination, and different opaque expression construction modes can be produced by utilizing different chaotic mapping and secondary mapping combinations, so that the code obfuscation process has diversity and uncertainty, and the universality and safety are higher.

Description

technical field [0001] The invention relates to the technical field of software protection, in particular to a code obfuscation method and device based on chaotic opaque predicates. Background technique [0002] As a medium of human-computer interaction, computer software greatly increases the convenience of computers and lowers the threshold for users to use computers. Commercial software with complete functions and technologies embodies the wisdom of developers, and the realization of software also contains the core business secrets of software manufacturers. Software piracy is an important security issue in the development of the software industry. Software reverse engineering cracks the software illegally, steals the core algorithm and commercial secrets of the software, and causes major damage to the intellectual property rights of the software, without the protection of due rights. In view of the seriousness of the current software security situation, software protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 苏庆孙金田
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products