华南理工大学学报(自然科学版) ›› 2015, Vol. 43 ›› Issue (5): 132-138.doi: 10.3969/j.issn.1000-565X.2015.05.021

• 计算机科学与技术 • 上一篇    下一篇

基于参数化分解树的控制流二次平展混淆方法

周娜琴 齐德昱   

  1. 华南理工大学 计算机系统研究所,广东 广州 510006
  • 收稿日期:2014-01-03 修回日期:2015-04-02 出版日期:2015-05-25 发布日期:2015-05-07
  • 通信作者: 周娜琴(1982-),女,博士生,主要从事软件安全研究. E-mail:zhou.naqin@mail.scut.edu.cn
  • 作者简介:周娜琴(1982-),女,博士生,主要从事软件安全研究.
  • 基金资助:

    广东省科技计划项目(2011B010200054);广东省自然科学基金团队项目(10351806001000000);广州市应用基础研究项目(11C41150785)

Parameterized Decomposition Tree-Based Obfuscation Method with Double Flattening Control Flow

Zhou Na-qin Qi De-yu   

  1. Research Institute of Computer Systems,South China University of Technology,Guangzhou 510006,Guangdong,China
  • Received:2014-01-03 Revised:2015-04-02 Online:2015-05-25 Published:2015-05-07
  • Contact: 周娜琴(1982-),女,博士生,主要从事软件安全研究. E-mail:zhou.naqin@mail.scut.edu.cn
  • About author:周娜琴(1982-),女,博士生,主要从事软件安全研究.
  • Supported by:
    Supported by the Science and Technology Planning Project of Guangdong Province(2011B010200054) and the Team Project Fund of Natural Science Foundation of Guangdong Province(10351806001000000)

摘要: 针对软件白盒子安全问题,提出了一种基于参数化分解树的控制流二次平展混淆的改进方法. 该方法首先根据设定的深度、广度及粒度的上界构建参数化分解树,然后用一个 while-switch 循环选择结构统筹整棵树,并对树中满足一定条件的节点进行二次平展. 实验结果表明:与基于参数化分解树的控制流平展混淆方法相比,文中方法减少了执行开销和解决深层不作为问题;与传统的控制流平展混淆方法相比,文中方法增加了反编译及逆向工程的难度.

关键词: 软件保护, 控制流平展, 代码混淆, 逆向工程, 分解树, 安全

Abstract: Aiming at the security problem of software white box,an improved parameterized decomposition tree-based obfuscation method with double flattening control flow is put forward. On the basis of given upper bounds of depth,breadth and granularity,the method builds a decomposition tree,coordinates the whole tree with a cycle se-lection structure named while-switch,and then applies double flattering to relevant nodes that satisfy certain condi-tions. Experimental results indicate that,in comparison with the flattening obfuscation method of control flow on the basis of parameterized decomposition tree,the proposed method reduces the execution expense and solves the deep nonfeasance problem; and that,in comparison with the traditional method only with flattening control flow,the pro-posed method increases the difficulty in decompilation and reverse engineering.

Key words: software protection, control flow flattening, code obfuscation, reverse engineering, decomposition tree, security

中图分类号: