Affiliation:
1. Department of Computer Science and Systems Engineering, College of Engineering (A), Andhra University, Visakhapatnam, India
Abstract
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the code so that it is unreadable or in an incomprehensible format. Since the objective of this article is to make a program obfuscated, the source code shall appear like normal native code and should be perfectly readable. As nobody can guess that the code is an obfuscated one, obviously it will be very tough to analyze. Nowadays, a lot of programs protect themselves from being analyzed by hiding their behaviors or compressing their semantics by using obfuscation techniques. On the contrary, self-modifying code (SMC) can challenge one's intellect to discover the real intrinsic meaning of the source code as it is difficult and strenuous to analyze, since the code gets modified dynamically during runtime. Hence, this article brings into play the underlying concepts of self-modifying codes for obfuscating the programs to construct a much better code protection model. Some techniques like indirect memory addressing, register renaming, direction-changing of instructions, segment ignoring, modification of registry content and many more are expounded in this article by using Assembly-level language, which is binary obfuscation.
Reference28 articles.
1. Anckaert, B. (2007). A Model for Self-Modifying Code, Information Hiding. In 8th International Workshop, IH 2006 (pp. 232-248). Springer.
2. Program obfuscation
3. Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code
4. Different Obfuscation Techniques for Code Protection
5. Bonfante, G., Marion, J., & Reynaud, D. (2009). A computability perspective on self-modifying programs. In Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods e SEFM, Hanoi, Viet Nam.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Security Model and Implementation of Embedded Software Based on Code Obfuscation;2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2020-12