Branch Obfuscation Using Binary Code Side Effects
- DOI
- 10.2991/iccnce.2013.37How to use a DOI?
- Keywords
- code obfuscation, binary code side effects, exception handling, symbolic execution, trusted entity
- Abstract
The path constraints are leaked by binary conditional jump instructions which are the binary representation of software’s internal logic. Based on the problem of software’s path constraints leaking, reverse engineering using path-sensitive techniques such as symbolic execution and theorem proving poses a new threat to software intellectual property protection. In order to mitigate path information leaking problem, this paper proposed a novel branch obfuscation scheme that uses binary code side effects to hide path constraints and takes advantage of remote trusted entity to protect software’s control flow graph, without changing software’s functionality. The experimental results show that this branch obfuscation technique could effectively protect software’s path constraints against state-of-the-art reverse engineering, yet practical in terms of performance.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Hong Lin AU - Xiaohua Zhang AU - Ma Yong AU - Baohui Wang PY - 2013/07 DA - 2013/07 TI - Branch Obfuscation Using Binary Code Side Effects BT - Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) PB - Atlantis Press SP - 152 EP - 157 SN - 1951-6851 UR - https://doi.org/10.2991/iccnce.2013.37 DO - 10.2991/iccnce.2013.37 ID - Lin2013/07 ER -