• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
Citation: Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368

A Code Encrypt Technique Based on Branch Condition Obfuscation

More Information
  • Published Date: September 30, 2019
  • Code encryption based on path branch obfuscation of equal condition can make the key be apart from the encrypted program, so this encryption can oppose static and dynamic programming analysis method at the same time, but it can’t be used with branches controlled by other comparative relationships. In this paper, using Lagrange interpolation method to produce input-preprocess function, we not only resolve the uniqueness problem of key which produced by multi-inputs of the branch, but also preserve the security of obfuscation on branch conditions, so the conditional code of multi-inputs branch can be encrypted. Using the method which resolves the uniqueness problem of key, code encryption based on equal condition branch obfuscation can be extended to branch of greater-than and less-than condition branch, and complicate condition branch formed by blending of interval condition and equal condition.
  • Related Articles

    [1]Sun Huaqi, Kang Fei, Shu Hui, Huang Yuyao, Bu Wenjuan. Binary Code Modularization Method Based on Graph Embedding[J]. Journal of Computer Research and Development, 2024, 61(9): 2275-2289. DOI: 10.7544/issn1000-1239.202330337
    [2]Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection Methods for Cloud Data Security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
    [3]Wang Jina, Chen Junhua, Gao Jianhua. ECC Multi-Label Code Smell Detection Method Based on Ranking Loss[J]. Journal of Computer Research and Development, 2021, 58(1): 178-188. DOI: 10.7544/issn1000-1239.2021.20190836
    [4]Zhang Shikun, Xie Rui, Ye Wei, Chen Long. Keyword-Based Source Code Summarization[J]. Journal of Computer Research and Development, 2020, 57(9): 1987-2000. DOI: 10.7544/issn1000-1239.2020.20190179
    [5]Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun. Trajectory Privacy Protection Method Based on Multi-Anonymizer[J]. Journal of Computer Research and Development, 2019, 56(3): 576-584. DOI: 10.7544/issn1000-1239.2019.20180033
    [6]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [7]Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
    [8]Li Zhiyuan, Bi Junlei, Wang Ruchuan. Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948
    [9]Ma Jinxin, Li Zhoujun, Hu Chaojian, Zhang Junxian, Guo Tao. A Reconstruction Method of Type Abstraction in Binary Code[J]. Journal of Computer Research and Development, 2013, 50(11): 2418-2428.
    [10]Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868.
  • Cited by

    Periodical cited type(5)

    1. 张黎,骆春山,谢委员,李蓓蓓. 基于分支混淆算法的隐私数据库自适应加密方法. 计算机与现代化. 2022(03): 43-47 .
    2. 陈金娥,陈涛,童绪军. 基于混合加密算法的安全通讯系统的设计与实现. 兰州文理学院学报(自然科学版). 2022(05): 67-71+93 .
    3. 肖玉强,郭云飞,王亚文. 基于符号执行和N-scope复杂度的代码混淆度量方法. 网络与信息安全学报. 2022(06): 123-134 .
    4. 王晓龙,董玉雪. 软件多分支开发代码漏合问题及解决途径. 计算机系统应用. 2021(10): 312-318 .
    5. 鲍海燕,芦彩林,李俊丽. 基于公钥密码的通信网络安全加密系统设计. 重庆理工大学学报(自然科学). 2020(10): 146-152 .

    Other cited types(3)

Catalog

    Article views (1098) PDF downloads (424) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return