Control flow obfuscation method and system based on a callback function

A callback function and control flow technology, applied in the field of network security, can solve the problems of high running overhead and low obfuscation intensity, achieve good applicability and enhance the anti-analysis ability.

Active Publication Date: 2020-09-29
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a control flow obfuscation method and system based on a callback function to solve the shortcomings of tradi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow obfuscation method and system based on a callback function
  • Control flow obfuscation method and system based on a callback function
  • Control flow obfuscation method and system based on a callback function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0027] Traditional obfuscation methods mainly increase program complexity by adding code redundancy and resist reverse analysis. The confusion intensity of this method depends on the degree of code redundancy, and it is difficult to cope with the increasingly efficient automatic analysis technology. Moreover, the introduction of code redundancy in the program will lead to increased code size and reduced operating efficiency, which does not meet the needs of the development of the software industry. . For this reason, embodiment of the present invention, see figure 1 As shown, a control flow obfuscation method based on a callback function is provided, including the following content:

[0028] S101. For the loop struc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and particularly relates to a control flow obfuscation method and system based on a callback function, aiming at a loop structure in aprogram, a basic block loop hop is converted into inter-function repeated calling through the callback function, so that the original execution logic of the program is hidden, and the original control flow of the program is merged into a sequence structure in a unified manner; through program analysis, data dependence is reconstructed in a callback function so as to maintain functional consistency before and after cyclic jump conversion. According to the method, the callback function is cyclically called; program key algorithm logic is hidden; the detection cannot be easily performed by an automatic analysis technology; the problem that a traditional confusion method is difficult to confront an automatic analysis means is effectively solved; because only a small number of function calls and necessary parameter transfer instructions are introduced into the original program, the influence on the program overhead is effective, the anti-analysis capability is greatly enhanced under the condition of ensuring the program execution efficiency, the program size and the execution efficiency are not obviously changed before and after an actual application test, and the method has good applicability.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a control flow obfuscation method and system based on a callback function. Background technique [0002] Reverse analysis technology is a common technique used by malicious code writers. By reverse-analyzing existing programs and mining the algorithmic logic and key data contained in the programs, software piracy and even vulnerability-based hacking attacks can be effectively implemented. According to a software survey released by the Business Software Alliance (BSA) in 2018, as many as 36% of installed software worldwide is not legally authorized, posing a great threat to the software industry and user information security. Code obfuscation technology is a common technology for software protection. By constructing an effective obfuscation algorithm, the program data flow and control flow are obfuscated to achieve the purpose of hiding code logic. Among th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F8/41
CPCG06F21/14G06F8/434
Inventor 舒辉沙子涵
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products