A New Compile-Time Obfuscation Scheme for Software Protection

2016 
With the development of reverse engineering, the software industry has suffered a great loss from the software piracy and malicious attack for a long time. What is ridiculous is that code obfuscation techniques that originate from malware can hide specific function of a program from malicious analysis and is frequently employed to mitigate this risk. However, while most of today's obfuscation methods are language embedded and depend on the target architecture, we propose a method of compile-time obfuscation and further present a prototype implementation based on the LLVM compiler infrastructure. Furthermore, the significantly progress in code analysis such as static analysis and dynamic analysis has made the former obfuscation methods ineffective. Thus, in our implementation, we aim at making reverse engineering considerably harder and improving the resistance against both static disassembling tools and dynamic reverse engineering at a reasonable performance loss.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    16
    References
    1
    Citations
    NaN
    KQI
    []