Affiliation:
1. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450000, China
Abstract
As reverse engineering technology develops rapidly, the financial loss caused by software security issues is urgent. Therefore, how to effectively protect software is a critical problem to solve. The software protection method based on code obfuscation is an effective way, and constructing an effective obfuscation algorithm can increase the cost of reverse software. It is conspicuous that current development of code obfuscation focuses on increasing the complexity of the code structure without paying much attention to the protection of program semantic information, which may help experienced attackers improve their analysis efficiency. This paper proposes COOPS for protecting software based on program semantic information, in which functions are regarded as basic semantic units. The switch relationship between the intrafunction control flow and the interfunction calling is established. The interfunction calling can be hidden in the intrafunction control flow, and in reverse, the intrafunction control flow can also be converted to interfunction calling. In this way, considering intraprogram function semantic unit level discrete, this method reconstructs the intraprogram semantic relationship. To determine the relative effectiveness, we have evaluated COOPS on OpenSSL and SpecInt-2000 test sets. For both of them, the function calling graphs before and after obfuscation differ more than 90%, which means COOPS significantly changes the control flow of the program. The evaluation shows that compared with O-LLVM, COOPS manifests strong resistance to Asm2vec and other program similarity analysis techniques and significantly improves the level of software protection rather than necessitating time-consuming and heavyweight problems.
Funder
National Basic Research Program of China
Subject
Computer Networks and Communications,Information Systems
Reference45 articles.
1. Transfer learning for malware multi-classification;M. Al Kadri
2. Throttling malware families in 2d;M. Nassar,2019
3. Modeling malware as a language;Y. Awad
4. Benchmarking convolutional and recurrent neural networks for malware classification;H. Safa
5. Code obfuscation against static and dynamic reverse engineering;S. Schrittwieser,2011
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Analysis of Software Obfuscation Techniques;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2023-05-15
2. Identification of binary file compilation information;2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC);2022-12-16