binOb+: a framework for potent and stealthy binary obfuscation

  • Authors:
  • Byoungyoung Lee;Yuna Kim;Jong Kim

  • Affiliations:
  • Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea;Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea;Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea

  • Venue:
  • ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Reverse engineering is the process of discovering a high-level structure and its semantics from a lower-level structure. In order to prevent malicious use of reverse engineering against binaries, various techniques have been developed called binary obfuscation. Obfuscated binary is a transformed binary which retains original binary's executing behavior while its outer representation obstructs the reverse engineering. In this paper we propose three novel approaches to improve the binary obfuscation. First we propose a generalized binary obfuscation algorithm that covers any specific or whole part of a binary code by using confusing code and redirecting control-flow using exceptions. Second, we employ a data-mining method to make our obfuscated binary look like a normal binary. And third, we address the issue that the previous techniques could not be applied to Windows binaries by designing a new exception hooking mechanism in Windows. Experimental results show that our obfuscated binary can hide 60--90% of the original instructions from reverse engineering tools, while its execution slows down a little, and moreover the obfuscated binary's stealth can be guaranteed.