Control flow based obfuscation

  • Authors:
  • Jun Ge;Soma Chaudhuri;Akhilesh Tyagi

  • Affiliations:
  • Iowa State University, Ames, IA;Iowa State University, Ames, IA;Iowa State University, Ames, IA

  • Venue:
  • Proceedings of the 5th ACM workshop on Digital rights management
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and efficiency to show that both are This supports the claim that our approach is practical.