DocumentCode :
1837277
Title :
Stealthy code obfuscation technique for software security
Author :
Darwish, Saad M. ; Guirguis, Shawkat K. ; Zalat, Mohamed S.
Author_Institution :
Inst. of Grad. Studies & Res., Univ. of Alexandria, Alexandria, Egypt
fYear :
2010
fDate :
Nov. 30 2010-Dec. 2 2010
Firstpage :
93
Lastpage :
99
Abstract :
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating transformations that conceal the control flow of the program in conjunction with obfuscation techniques employed by viruses in commercial side software to achieve the power of virus´s hiding with the aim of improving the quality of overall obfuscation and the protection of intellectual property. This work utilizes an IF statement mechanism as a way to construct inexpensive and stealthy opaque predicates. Experimental results indicate that significant portions of source code that have been obfuscated using the proposed technique are disassembled incorrectly, thereby protecting the functionality of the codes.
Keywords :
computer viruses; industrial property; reverse engineering; IF statement mechanism; intellectual property; malicious reverse engineering; software security; source code; stealthy code obfuscation technique; Algorithm design and analysis; Assembly; Equations; Registers; Reverse engineering; Software; Viruses (medical); Code obfuscation; Malicious reverse engineering; Software security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering and Systems (ICCES), 2010 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-7040-2
Type :
conf
DOI :
10.1109/ICCES.2010.5674830
Filename :
5674830
Link To Document :
بازگشت