Technology of Information Security
|
3411-3416

Control flow obfuscation algorithm based on redundant code

Le Deguang1
Zhao Jie2
Qian Zhenjiang1
1. School of Computer Science & Engineering, Changshu Institute of Technology, Changshu Jiangsu 215500, China
2. Suzhou TongCheng Tourism Network Technology Co. , Ltd. , Suzhou Jiangsu 215123, China

Abstract

The flattening control flow is applied through combining with opaque predicates such as chaos mapping and congruence equation algorithms. These algorithms cause a lot of extra cost. Besides, the flattening control flow combined with opaque predicate can not defense the dynamic reverse attack. In order to resolve these problems, this paper proposed to insert the redundant block, which structure was similar to basic block, and produced randomly, so that it was different to basic block. Therefore, it was difficult for attacker to differ redundant block from basic block. Then, it flattened the control flow with basic and redundant blocks, which further obfuscated the structure of control flow. Besides, it strengthened the branch variable by constructing the dynamic assignment algorithm of branch function, which improved the obfuscation resilience. This paper tested the proposed control flow obfuscation algorithm through the programs of mbed TLS from the control flow analysis, reverse engineering analysis and performance analysis. The results of test show the proposed algorithm not only improves the obfuscation potency, but also can protect the control flow information of program and resist static and dynamic reverse analysis.

Foundation Support

江苏省自然科学基金面上项目(BK20191475)
江苏省高校自然科学研究面上项目(18KJB520002)
教育部人文社会科学研究项目(18YJCZH068)
教育部“新一代信息技术”产学研创新基金资助项目(2018A01003)
江苏省高校“青蓝工程”优秀青年骨干教师培养对象项目(2017)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2019.07.0290
Publish at: Application Research of Computers Printed Article, Vol. 37, 2020 No. 11
Section: Technology of Information Security
Pages: 3411-3416
Serial Number: 1001-3695(2020)11-043-3411-06

Publish History

[2020-11-05] Printed Article

Cite This Article

乐德广, 赵杰, 钱振江. 基于冗余代码的控制流混淆算法 [J]. 计算机应用研究, 2020, 37 (11): 3411-3416. (Le Deguang, Zhao Jie, Qian Zhenjiang. Control flow obfuscation algorithm based on redundant code [J]. Application Research of Computers, 2020, 37 (11): 3411-3416. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)