【24h】

BinSEAL: Linux Binary Obfuscation Against Symbolic Execution

机译:伯斯利亚:Linux二进制混淆反对符号执行

获取原文

摘要

With the development of the software industry, the competition between software protection and cracking has become increasingly fierce, and corresponding protection and cracking methods have emerged in endlessly. Nowadays, most hackers need reverse engineering coupled with static analysis to perform cracking. Software protection is usually prevented from being cracked or maliciously reused through program obfuscation. Opaque predicates have been proposed for program obfuscation in recent years. The main approaches are to add condition branches with bogus program paths whose execution is unknown before runtime. Unlike those approaches, we propose a new obfuscation method dubbed BinSEAL in this paper by converting direct function calls of a program into indirect ones and using opaque predicates to obfuscate the target addresses. We implement BinSEAL and publish a toolset that can automatically transform Linux COTS binaries into obfuscated ones without requiring binary reconstruction. Evaluation results show that our method can resist certain static analysis such as symbolic execution.
机译:随着软件行业的发展,软件保护与开裂之间的竞争日益激烈,相应的保护和裂缝方法无休止地出现。如今,大多数黑客需要逆向工程,静态分析耦合以进行开裂。通常防止软件保护通过计划混淆来破解或恶意重复使用。近年来提出了不透明的谓词进行计划混淆。主要方法是添加条件分支与虚假程序路径,其执行在运行时未知。与这些方法不同,我们通过将程序的直接函数调用转换为间接函数并使用不透明的谓词来制定新的混淆方法,并使用不透明的谓词来混淆目标地址。我们实施伯斯本和发布一个工具集,可以在不需要二进制重建的情况下自动将Linux Cots二进制文件转换为混淆的。评估结果表明,我们的方法可以抵抗某些静态分析,例如符号执行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号