Formal Considerations and a Practical Approach to Intermediate-Level Obfuscation

نویسنده

  • DMITRIY DUNAEV
چکیده

The essence of obfuscation is to entangle the code and eliminate the majority of logical links in it. The offered theoretical apparatus allows describing obfuscated routines by concatenation of original and fake operational logics. This approach considers not only instructions or routines themselves, but the actions (results) they produce, what makes obfuscation a process of adding excessive functionality. The mathematical apparatus presented in the paper, discusses introductory terms, definitions, operations, and formulates a proposition about NP-completeness of a special deobfuscation problem. We formulate the problem statement and prove that the significance of operational logic in the obfuscated routine is an NP-complete problem. We point out the applicability limits of this proposition, and offer a practical approach that can noticeably reduce the probability of having a deobfuscator running in polynomial time. This paper also offers recommendations for constructing obfuscating transformations and points out a practical approach to creation of intermediatelevel obfuscating algorithm. Key-Words: Obfuscation, operational logic, global context, NP-completeness, intermediate representation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Reliable yet Flexible Software through If-Then Model Transformation Rules

Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...

متن کامل

Applicability of Indistinguishability Obfuscation Seminar report for Research Seminar in Cryptography

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...

متن کامل

Behavioral Analysis of Obfuscated Code

Classically, the procedure for reverse engineering binary code is to use a disassembler and to manually reconstruct the logic of the original program. Unfortunately, this is not always practical as obfuscation can make the binary extremely large by overcomplicating the program logic or adding bogus code. We present a novel approach, based on extracting semantic information by analyzing the beha...

متن کامل

On Secure and Usable Program Obfuscation: A Survey

Program obfuscation is a widely employed approach for software intellectual property protection. However, general obfuscation methods (e.g., lexical obfuscation, control obfuscation) implemented in mainstream obfuscation tools are heuristic and have little security guarantee. Recently in 2013, Garg et al. have achieved a breakthrough in secure program obfuscation with a graded encoding mechanis...

متن کامل

Explaining the Level of Human Thought in the Parallel Civilizations Based on Formal Structure and Visual Imagination Formed in Mythical Narratives

Myth, like any other form of narrative, has an undeniable role in visual imagination based on the foundations of mythical thought. Ernst Cassirer, by recovering the fundamental principles of mythical thought, brings against them to the foundations of contemporary rational thought and defines the fundamental features of mythical thought as compared to modern rational thought. He also believes t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014