Embedded Software Security through Key-Based Control Flow Obfuscation

Author(s):  
Rajat Subhra Chakraborty ◽  
Seetharam Narasimhan ◽  
Swarup Bhunia
2017 ◽  
Vol 14 (11) ◽  
pp. 247-259 ◽  
Author(s):  
Yong Peng ◽  
Guanyu Su ◽  
Bin Tian ◽  
Maohua Sun ◽  
Qi Li

2018 ◽  
Vol 2018 ◽  
pp. 1-6
Author(s):  
Bahare Hashemzade ◽  
Ali Maroosi

Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article. This paper proposes a hybrid of two signals and encryption obfuscation to hide the behaviour program and prevent reconstruction of the normal code by hackers. The usual signal method is strong enough for obfuscation, but its problem is the high complexity because of a lot of call and return instructions. In this study, a new dispatcher was added to the source code to reconstruct the original control flow graph from the hidden one to solve the problem of the signal method. This dispatcher code is encrypted to preclude access by the hacker. In this paper, the potency that makes the obfuscation strong has been increased and the resilience that makes the obfuscation poor has been decreased. The results of a comparison of the similarity among the ambiguous data with its original code and with available efficient methods present a performance advantage of the proposed hybrid obfuscation algorithm.


Sign in / Sign up

Export Citation Format

Share Document