Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A source code obfuscation method and device based on symbolic execution

A symbolic execution and source code technology, applied in the field of source code obfuscation based on symbolic execution, can solve the problem that the anti-reverse analysis ability of source code needs to be improved, and achieve the effect of improving the anti-reverse analysis ability

Active Publication Date: 2021-09-03
BEIJING BANGCLE TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing source code obfuscation methods such as control flow flattening still have the risk of being cracked, and the ability to prevent reverse analysis of source code needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A source code obfuscation method and device based on symbolic execution
  • A source code obfuscation method and device based on symbolic execution
  • A source code obfuscation method and device based on symbolic execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0024] In order to improve the anti-reverse analysis capability of the source code, the embodiment of the present application provides a source code obfuscation method and device based on symbolic execution, which will be described respectively below.

[0025] It should be noted that the execution subject implementing the source code obfuscation metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a source code obfuscation method and device based on symbolic execution, which can determine the target variable to be protected in the source code to be obfuscated; insert at least one intermediate variable in the source code, and the at least one intermediate variable is used to access The target variable; replace part of the target variable in the source code with any intermediate variable. Since some target variables are replaced by intermediate variables, the purpose of blurring and confusing the target table variables in the source code can be achieved, and the corresponding relationship between the target variable and the memory storage location can be blurred and confused, giving the attack Or cause the illusion that the storage location where the target variable is originally stored in the memory is the storage location where the intermediate variable is stored. Since the variable that the attacker is interested in is the target variable that needs to be protected rather than the intermediate variable, the attacker can be deceived not to analyze the target variable indirectly represented by the intermediate variable, and finally improve the anti-reverse analysis capability of the source code.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a source code obfuscation method and device based on symbolic execution. Background technique [0002] Nowadays, with the rapid development of technologies such as the mobile Internet, the Internet of Things, and the Internet of Vehicles, the number of terminals is increasing, and more and more applications are installed in the terminals, which brings great convenience to people's work and life . Some important information will be generated during the running of the application, which arouses the great interest of the attackers, which makes the important information have the risk of being leaked. [0003] At present, attackers often use static analysis tools such as symbolic execution models to reverse-analyze and crack the source code of the application to obtain the execution logic of the application, thereby illegally stealing and illegally tampering with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 阚志刚陈彪尉爽生王文洋李世杰卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products