Program control flow obfuscation method and system, storage medium, cloud server and application

A control flow and original program technology, applied in the system, storage medium, program control flow obfuscation method, cloud server and application fields, can solve problems such as user program logic and algorithm being stolen, environment untrustworthy, etc., to increase difficulty, The effect of avoiding malicious acquisition and exploitation, high control flow confidentiality

Pending Publication Date: 2020-08-14
XIDIAN UNIV
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) The user uploads the program to the cloud for execution. The cloud environment is untrustworthy, and the user program logic and algorithm face the risk of being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program control flow obfuscation method and system, storage medium, cloud server and application
  • Program control flow obfuscation method and system, storage medium, cloud server and application
  • Program control flow obfuscation method and system, storage medium, cloud server and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0071] Aiming at the problems existing in the prior art, the present invention provides a program control flow obfuscation method, system, storage medium, cloud server and application. The present invention will be described in detail below with reference to the accompanying drawings.

[0072] like figure 1 As shown, the program control flow obfuscation method provided by the present invention comprises the following steps:

[0073] S101: Construction and insertion of pseudo-branch statements, constructing and inserting pseudo-branch statements before the original statement s, these pseudo-branch statements will eventuall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of control flow obfuscation, and discloses a program control flow obfuscation method and system, a storage medium, a cloud server and an application. Branch statement judgment conditions in an original program are hidden, and a control flow query function is used for replacing the branch statement judgment conditions; the control flow is further obfuscated by inserting a pseudo-branch statement into the program; the conversion program is sent to an untrusted public cloud, and a control flow matrix is sent to a trusted private cloud; and the conversion program is run on the public cloud based on the control flow matrix. According to the invention, the variable of each branch statement condition can be hidden, so that application program logic isprevented from being maliciously acquired and utilized by an external attacker; a pseudo branch statement is inserted to increase the difficulty of reconstructing a program control flow by an attacker; and a relation constraint statement is inserted, and data flow consistency check is carried out, so that an attacker is resisted to actively change the running process of a program, and new data ispurposefully added in the program running process to collect effective information.

Description

technical field [0001] The invention belongs to the technical field of control flow obfuscation, and in particular relates to a program control flow obfuscation method, system, storage medium, cloud server and application. Background technique [0002] At present, the security protection of program code is an important research content in the field of computer security. With the rapid development of the Internet and the advent of the era of big data, cloud computing services are becoming more and more popular, and the cloud computing environment can bring stronger computing power and better scalability to users. Cloud computing enables users to rent computing resources on demand and execute their programs remotely. However, protecting the confidentiality of program logic becomes an important security requirement when the remote environment is not trusted. [0003] The control flow of the program code determines the sequence of instructions to be executed and directly refle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 沈玉龙王博何昶辉赵迪张志为何嘉洪康晓宇刘家继许王哲
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products