Code obfuscation method based on parent fusion
A code obfuscation and parent technology, applied in the field of network security, can solve problems such as difficulty in dealing with automatic analysis technology, obfuscation intensity dependence, etc., to enhance anti-analysis ability and anti-homology detection ability, ensure execution correctness and invariance, The effect of enriching code execution flow structure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Embodiment 1: This embodiment provides a method of confusing a maternal fusion, the method needs to be shared between the target code and the matrix, first requiring the appropriate matrix as a fusion basis, wherein The matrix selection is a harmless but functional program as a parent code, and the maternal code needs to meet the following conditions:
[0033] (1) The code program that needs to be protected belongs to the same programming language, which has the same language rules; (2) Avoid code conflicts between code, code does not conflict between code to be protected during operation, such as operation behavior conflicts Wait.
[0034] From the algorithm, all nodes in the control flow map are traveled, and the code blocks corresponding to the node must be recorded, and the part code block is used as a fusion point as a fusion point in the order of execution.
[0035] After determining the parent code, the maternal code is to be executed. When the motion is executed in ...
Embodiment 2
[0066] Example 2: This embodiment is controlled as an example, and the control flow diagram of the maternal code and the target code before and after fusion is as follows, as shown Figure 2-4 Disted, where figure 2 Control flow map for the leading target code, image 3 Control flow map for the fusion of the prehealth Figure 4 Control flow diagram for the fusion code.
[0067] The relevant data of the target code is defined in the initial phase. After the fusion, the target code data is integrated with the matrix data, which is in the initial stage of the program, that is, the location where the flow map depth is 0 (the uppermost basic block starts at 0, " The same below is initialized, and the data access requirements of the program are guaranteed. The basic block of the control flow diagram of the target code program is dispersed in the fused program control flow diagram, such as one of the basic blocks in the depth of 4 after the convergence control flow diagram, in the semantic,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


