[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code

Published: 01 April 2013 Publication History

Abstract

Software code released to the user has the risk of reverse engineering attacks. Software obfuscation techniques can be employed to make the reverse engineering of software programs harder. In this paper, we propose a potent, stealthy, and cost-effective algorithm to obfuscate software programs. The main idea of the algorithm is to remove control flow information from the code area and hide them in the data area. During execution time, these instructions are reconstructed, thereby preserving the semantics of the program. Experimental results indicate that the algorithm performs well against static and dynamic attacks. Also the obfuscated program is hard to be differentiated from normal binary programs demonstrating the obfuscations good stealth measure.

Cited By

View all
  • (2019)Enhanced branch obfuscation based on exception handling and encrypted mapping tableProceedings of the ACM Turing Celebration Conference - China10.1145/3321408.3326668(1-9)Online publication date: 17-May-2019
  • (2018)Dynamic Self-modifying Code Detection Based on Backward AnalysisProceedings of the 2018 10th International Conference on Computer and Automation Engineering10.1145/3192975.3193016(199-204)Online publication date: 24-Feb-2018
  • (2017)Self-Modifying CodeInternational Journal of Secure Software Engineering10.4018/IJSSE.20170701028:3(24-41)Online publication date: 1-Jul-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 8, Issue 4
April 2013
102 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2013

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Enhanced branch obfuscation based on exception handling and encrypted mapping tableProceedings of the ACM Turing Celebration Conference - China10.1145/3321408.3326668(1-9)Online publication date: 17-May-2019
  • (2018)Dynamic Self-modifying Code Detection Based on Backward AnalysisProceedings of the 2018 10th International Conference on Computer and Automation Engineering10.1145/3192975.3193016(199-204)Online publication date: 24-Feb-2018
  • (2017)Self-Modifying CodeInternational Journal of Secure Software Engineering10.4018/IJSSE.20170701028:3(24-41)Online publication date: 1-Jul-2017
  • (2017)A Novel Software Protection Approach for Code Obfuscation to Enhance Software SecurityInternational Journal of Mobile Computing and Multimedia Communications10.4018/IJMCMC.20170101038:1(34-47)Online publication date: 1-Jan-2017
  • (2016)Control flow obfuscation for Android applicationsComputers and Security10.1016/j.cose.2016.05.00361:C(72-93)Online publication date: 1-Aug-2016

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media