Control flow flattening obfuscation method for position-independent codes
A control flow, flattening technology, applied in the direction of code compilation, version control, program code conversion, etc., can solve the problem of location-independent code protection vacancies, increased analysis costs, etc., to prevent memory detection, ensure confidentiality, and ensure isolation. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0035] Such as figure 1 As shown, this embodiment provides a position-independent code control flow flattening and obfuscation method, which includes the following steps:
[0036] S1. Disassemble the input object code position-independent code to construct the entire instruction sequence;
[0037] Specifically, the file path of the position-independent code is passed to the obfuscator, and after the file data is read, the disassembly operation is performed by the disassembly engine to obtain the instruction sequence, and the execution entry point is found.
[0038] S2. Divide the instruction sequence into units of functions, and then divide each function into a control flow graph in units of basic blocks;
[0039] Specifically, the basic instruction call instruction that parses the instruction sequence uses the instruction operand that belongs to the internal call of the module as the starting address of the function to divide the function unit. For example, the call 401000h ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


