An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs

  • Authors:
  • Stanley Chow;Yuan Gu;Harold Johnson;Vladimir A. Zakharov

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ISC '01 Proceedings of the 4th International Conference on Information Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present a straightforward approach to the obfuscation of sequential program control-flow in order to design tamperresistant software. The principal idea of our technique is as follows: Let I be an instance of a hard combinatorial problem C, whose solution K is known. Then, given a source program 驴, we implant I into 驴 by applying semantics-preserving transformations and using K as a key. This yields as its result an obfuscated program 驴I,K, such that a detection of some property P of 驴I,K, which is essential for comprehending the program, gives a solution to I. Varying instances I, we obtain a family 驴C of obfuscated programs such that the problem of checking P for 驴C is at least as hard as C. We show how this technique works by taking for C the acceptance problem for linear bounded Turing machines, which is known to be pspace-complete.