• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
Citation: Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607

Using Code Mobility to Obfuscate Control Flow in Binary Codes

More Information
  • Published Date: July 31, 2015
  • Code obfuscation is usually used in software protection and malware combating reverse engineering. There are some security issues in traditional code obfuscation methods, because reverse engineers can acquire all binary codes. To mitigate this problem, this paper presents a novel control flow obfuscation approach to protect the control flow of binary codes based on code mobility. Transforming the significant control logic codes to a remote trusted entity beyond adversary’s control makes some control flow information invisible at local untrusted execution environment, so that the binary code’s key behaviors cannot be predicted statically or dynamically. Non-conditional jump instructions without control information are used to replace some critical conditional jumps to hide branch conditions and jump target memory addresses, which increases the difficulty of collecting and reasoning about the program path information. We estimate this obfuscation approach in three aspects: potency, resilience and cost. And using this approach, we obfuscate the trigger conditions in six malware samples belonging to different families, and then use the state-of-the-art reverse engineering tools to reason about their internal control logic. Experimental result shows that our obfuscation approach is able to protect various branch conditions and reduce the leakage of branch information at run-time that impedes reverse engineering based on symbolic execution to analyze program’s internal logic.
  • Related Articles

    [1]Liu Runtao, Liang Jianchuang. Reverse Nearest Neighbor Query Based on New Index Structure[J]. Journal of Computer Research and Development, 2020, 57(6): 1335-1346. DOI: 10.7544/issn1000-1239.2020.20190470
    [2]Li Song, Dou Yanan, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. The Method of the K-Dominant Space Skyline Query in Road Network[J]. Journal of Computer Research and Development, 2020, 57(1): 227-239. DOI: 10.7544/issn1000-1239.2020.20190026
    [3]Li Song, Zhang Liping, Hao Zhongxiao. Strong Neighborhood Pair Query in Dynamic Dataset[J]. Journal of Computer Research and Development, 2015, 52(3): 749-759. DOI: 10.7544/issn1000-1239.2015.20131390
    [4]Yang Zexue, Hao Zhongxiao. Group Obstacle Nearest Neighbor Query in Spatial Database[J]. Journal of Computer Research and Development, 2013, 50(11): 2455-2462.
    [5]Liu Junling, Yu Ge, Sun Huanliang. Topic-relevant Region Queries in Spatial Database[J]. Journal of Computer Research and Development, 2012, 49(10): 2171-2180.
    [6]Wang Jinbao, Gao Hong, Li Jianzhong, Yang Donghua. An Index Supporting Spatial Approximate Keyword Search on Disks[J]. Journal of Computer Research and Development, 2012, 49(10): 2142-2152.
    [7]Liu Runtao, Hao Zhongxiao. Fast Algorithm of Nearest Neighbor Query for Line Segments of Spatial Database[J]. Journal of Computer Research and Development, 2011, 48(12): 2379-2384.
    [8]Liao Haojun, Han Jizhong, Fang Jinyun. All-Nearest-Neighbor Queries Processing in Spatial Databases[J]. Journal of Computer Research and Development, 2011, 48(1): 86-93.
    [9]Liu Runtao, Hao Zhongxiao. A Multi-Order Based Index Structure for Spatial Data—MOIS-tree[J]. Journal of Computer Research and Development, 2010, 47(5): 849-857.
    [10]Hao Zhongxiao, Wang Yudong, He Yunbin. Line Segment Nearest Neighbor Query of Spatial Database[J]. Journal of Computer Research and Development, 2008, 45(9): 1539-1545.

Catalog

    Article views (1722) PDF downloads (880) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return