A framework for obfuscated interpretation
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Software obfuscation from crackers' viewpoint
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
Software issues in digital forensics
ACM SIGOPS Operating Systems Review
Reconstructing a Packed DLL Binary for Static Analysis
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A model for self-modifying code
IH'06 Proceedings of the 8th international conference on Information hiding
Developments in Cartesian Genetic Programming: self-modifying CGP
Genetic Programming and Evolvable Machines
Language-independent sandboxing of just-in-time compilation and self-modifying code
Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation
An attack on SMC-based software protection
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Replacement attacks against VM-protected applications
VEE '12 Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments
Software protection through dynamic code mutation
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Hi-index | 0.00 |
In this paper, we present a new method to protect soft-wareagainst illegal acts of hacking. The key idea is to add amechanism of self-modifying codes to the original program,so that the original program becomes hard to be analyzed.In the binary program obtained by the proposed method,the original code fragments we want to protect are camouflagedby dummy instructions. Then, the binary programautonomously restores the original code fragments withina certain period of execution, by replacing the dummy instructionswith the original ones. Since the dummy instructionsare completely different from the original ones, codehacking fails if the dummy instructions are read as theyare. Moreover, the dummy instructions are scattered overthe program, therefore, they are hard to be identified. As aresult, the proposed method helps to construct highly invulnerablesoftware without special hardware.