Exploiting Self-Modification Mechanism for Program Protection

  • Authors:
  • Yuichiro Kanzaki;Akito Monden;Masahide Nakamura;Ken-ichi Matsumoto

  • Affiliations:
  • -;-;-;-

  • Venue:
  • COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a new method to protect soft-wareagainst illegal acts of hacking. The key idea is to add amechanism of self-modifying codes to the original program,so that the original program becomes hard to be analyzed.In the binary program obtained by the proposed method,the original code fragments we want to protect are camouflagedby dummy instructions. Then, the binary programautonomously restores the original code fragments withina certain period of execution, by replacing the dummy instructionswith the original ones. Since the dummy instructionsare completely different from the original ones, codehacking fails if the dummy instructions are read as theyare. Moreover, the dummy instructions are scattered overthe program, therefore, they are hard to be identified. As aresult, the proposed method helps to construct highly invulnerablesoftware without special hardware.