Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)

Branch Obfuscation Using Binary Code Side Effects

Authors
Hong Lin, Xiaohua Zhang, Ma Yong, Baohui Wang
Corresponding Author
Hong Lin
Available Online July 2013.
DOI
10.2991/iccnce.2013.37How to use a DOI?
Keywords
code obfuscation, binary code side effects, exception handling, symbolic execution, trusted entity
Abstract

The path constraints are leaked by binary conditional jump instructions which are the binary representation of software’s internal logic. Based on the problem of software’s path constraints leaking, reverse engineering using path-sensitive techniques such as symbolic execution and theorem proving poses a new threat to software intellectual property protection. In order to mitigate path information leaking problem, this paper proposed a novel branch obfuscation scheme that uses binary code side effects to hide path constraints and takes advantage of remote trusted entity to protect software’s control flow graph, without changing software’s functionality. The experimental results show that this branch obfuscation technique could effectively protect software’s path constraints against state-of-the-art reverse engineering, yet practical in terms of performance.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
July 2013
ISBN
10.2991/iccnce.2013.37
ISSN
1951-6851
DOI
10.2991/iccnce.2013.37How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Hong Lin
AU  - Xiaohua Zhang
AU  - Ma Yong
AU  - Baohui Wang
PY  - 2013/07
DA  - 2013/07
TI  - Branch Obfuscation Using Binary Code Side Effects
BT  - Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)
PB  - Atlantis Press
SP  - 152
EP  - 157
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccnce.2013.37
DO  - 10.2991/iccnce.2013.37
ID  - Lin2013/07
ER  -