Unlock instant, AI-driven research and patent intelligence for your innovation.

Code obfuscation method based on parent fusion

A code obfuscation and parent technology, applied in the field of network security, can solve problems such as difficulty in dealing with automatic analysis technology, obfuscation intensity dependence, etc., to enhance anti-analysis ability and anti-homology detection ability, ensure execution correctness and invariance, The effect of enriching code execution flow structure

Active Publication Date: 2021-07-23
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For the traditional code obfuscation algorithm, it mainly adds code redundancy, increases program complexity, and resists reverse analysis. The obfuscation features, and expose the obfuscation techniques, making it easier for the program to bypass the obfuscation and analyze the defects and problems. The present invention provides a code obfuscation method based on matrix fusion with high obfuscation intensity and novel method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method based on parent fusion
  • Code obfuscation method based on parent fusion
  • Code obfuscation method based on parent fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment 1: This embodiment provides a method of confusing a maternal fusion, the method needs to be shared between the target code and the matrix, first requiring the appropriate matrix as a fusion basis, wherein The matrix selection is a harmless but functional program as a parent code, and the maternal code needs to meet the following conditions:

[0033] (1) The code program that needs to be protected belongs to the same programming language, which has the same language rules; (2) Avoid code conflicts between code, code does not conflict between code to be protected during operation, such as operation behavior conflicts Wait.

[0034] From the algorithm, all nodes in the control flow map are traveled, and the code blocks corresponding to the node must be recorded, and the part code block is used as a fusion point as a fusion point in the order of execution.

[0035] After determining the parent code, the maternal code is to be executed. When the motion is executed in ...

Embodiment 2

[0066] Example 2: This embodiment is controlled as an example, and the control flow diagram of the maternal code and the target code before and after fusion is as follows, as shown Figure 2-4 Disted, where figure 2 Control flow map for the leading target code, image 3 Control flow map for the fusion of the prehealth Figure 4 Control flow diagram for the fusion code.

[0067] The relevant data of the target code is defined in the initial phase. After the fusion, the target code data is integrated with the matrix data, which is in the initial stage of the program, that is, the location where the flow map depth is 0 (the uppermost basic block starts at 0, " The same below is initialized, and the data access requirements of the program are guaranteed. The basic block of the control flow diagram of the target code program is dispersed in the fused program control flow diagram, such as one of the basic blocks in the depth of 4 after the convergence control flow diagram, in the semantic,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and particularly relates to a code obfuscation method based on parent fusion. According to the method, the parent code program and the to-be-protected code are structurally merged, and logic association is generated between the parent code and the to-be-protected code through modes such as variable sharing, so that the two codes are merged into a new code which is not easy to segment, has original code functions and hides an original execution flow graph structure; therefore, the original program is protected. According to the method, excessive processing on a source code form in a traditional obfuscation method is abandoned, the problem that the traditional obfuscation method is difficult to confront an automatic analysis means and has obvious obfuscation characteristics can be effectively solved, and the obfuscation effect is good; and the obfuscation method is suitable for most programming languages and has good universality.

Description

Technical field [0001] The present invention belongs to the network security technology, and in particular, the present invention relates to a code confusion method based on a maternal fusion. Background technique [0002] Reverse analysis technology is a technique for the general purpose of malicious code. By reverse analysis of existing procedures, the algorithm logic and critical data contained in the program can effectively implement the software piracy or even loopholes. According to the software survey released by the Software Alliance, referred to as BSA, it is shown that there are 36% of the installed software in the world that has not been legally authorized, and the software industry and user information security have a great threat. [0003] The code confusion technology is a general technology for software protection. By changing the code in semantic, logical, or expressions, the original implementation logic is confused, and the purpose of hiding the core function is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F8/74G06F8/41
CPCG06F21/14G06F8/434G06F8/74
Inventor 舒辉熊小兵于璞康绯杨巨赵耘田
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU