Title :
Stealthy code obfuscation technique for software security
Author :
Darwish, Saad M. ; Guirguis, Shawkat K. ; Zalat, Mohamed S.
Author_Institution :
Inst. of Grad. Studies & Res., Univ. of Alexandria, Alexandria, Egypt
fDate :
Nov. 30 2010-Dec. 2 2010
Abstract :
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating transformations that conceal the control flow of the program in conjunction with obfuscation techniques employed by viruses in commercial side software to achieve the power of virus´s hiding with the aim of improving the quality of overall obfuscation and the protection of intellectual property. This work utilizes an IF statement mechanism as a way to construct inexpensive and stealthy opaque predicates. Experimental results indicate that significant portions of source code that have been obfuscated using the proposed technique are disassembled incorrectly, thereby protecting the functionality of the codes.
Keywords :
computer viruses; industrial property; reverse engineering; IF statement mechanism; intellectual property; malicious reverse engineering; software security; source code; stealthy code obfuscation technique; Algorithm design and analysis; Assembly; Equations; Registers; Reverse engineering; Software; Viruses (medical); Code obfuscation; Malicious reverse engineering; Software security;
Conference_Titel :
Computer Engineering and Systems (ICCES), 2010 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-7040-2
DOI :
10.1109/ICCES.2010.5674830