首页> 外文会议>ACM conference on Computer and communications security >Obfuscation of executable code to improve resistance to static disassembly
【24h】

Obfuscation of executable code to improve resistance to static disassembly

机译:对可执行代码进行混淆以提高对静态反汇编的抵抗力

获取原文

摘要

A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can create opportunities for theft of intellectual property via software piracy, as well as security breaches by allowing attackers to discover vulnerabilities in an application. The process of reverse engineering an executable program typically begins with disassembly, which translates machine code to assembly code. This is then followed by various decompilation steps that aim to recover higher-level abstractions from the assembly code. Most of the work to date on code obfuscation has focused on disrupting or confusing the decompilation phase. This paper, by contrast, focuses on the initial disassembly phase. Our goal is to disrupt the static disassembly process so as to make programs harder to disassemble correctly. We describe two widely used static disassembly algorithms, and discuss techniques to thwart each of them. Experimental results indicate that significant portions of executables that have been obfuscated using our techniques are disassembled incorrectly, thereby showing the efficacy of our methods.
机译:大量软件以可执行代码的形式分发。对此类可执行文件进行反向工程的能力可以通过盗版软件为盗窃知识产权创造机会,并通过允许攻击者发现应用程序中的漏洞来破坏安全性。对可执行程序进行逆向工程的过程通常从反汇编开始,反汇编将机器代码转换为汇编代码。然后是各种反编译步骤,旨在从汇编代码中恢复更高级别的抽象。迄今为止,有关代码混淆的大多数工作都集中在破坏或混淆反编译阶段。相比之下,本文着眼于初始拆卸阶段。我们的目标是破坏静态反汇编过程,以使程序难以正确反汇编。我们描述了两种广泛使用的静态反汇编算法,并讨论了阻止它们的技术。实验结果表明,使用我们的技术模糊处理的可执行文件的重要部分被错误地反汇编,从而显示了我们方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号