Computer Science ›› 2017, Vol. 44 ›› Issue (12): 114-114.doi: 10.11896/j.issn.1002-137X.2017.12.022

Previous Articles     Next Articles

Research on Opaque Predicate Obfuscation Technique Based on Chaotic Opaque Expression

SU Qing and SUN Jin-tian   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In order to improve the code confusion,a chaotic opaque expression construction method based on chaotic map and quadratic map was proposed.According to the definition of chaotic opaque expression,the chaotic map with the properties of initial value sensitive dependence,pseudo-randomness,uniform distribution of state space,multiple bran-ching and non-special symbols is used.Taking two-dimensional tent map as an example,the matched quadratic map maps the running state space of the chaotic map to the result space of the expression to construct a chaotic opaque expression.Combining chaotic opaque expression with opaque predicate,a new method for constructing opaque predicate is formed.At the same time,an opaque predicate insertion method was proposed in which a new construction predicate is merged with an original predicate.The combination of the both forms a new opaque predicate obfuscation technique.The experimental results show that the technique has obvious improvement in various software complexity indexes,and the cost of the program is relatively lower.

Key words: Code obfuscation,Chaotic map,Chaotic opaque expression,Two-dimensional tent map,Opaque predicate

[1] PREDA M D,GIACOBAZZI R.Control Code Obfuscation byAbstract Interpretation[C]∥IEEE International Conference on Software Engineering and Formal Methods.IEEE Xplore,2005:301-310.
[2] ZHAO Y J,TANG Z Y,WANG I.Evaluation of code obfuscating Transformation[J].Journal of Software,2012,23(3):700-711.
[3] COLLBERG C,THOMBORSON C D.Low manufacturing cheap,resilient,and stealthy opaque constructs[C]∥Proceeding of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.California:ACM,1998:184-196.
[4] ARBOIT G.A method for watermarking java programs viaopaque predicates[C]∥The Fifth International Conference on Electronic Commerce Research (ICECR-5).2002:102-110.
[5] MYLES G,COLLBERG C.Software watermarking via opaquepredicates:implementation,analysis,and attacks[J].Electron Commerce Research,2006,4(6):155-171.
[6] YUAN Z,WEN Q,MAO M.Constructing Opaque Predicatesfor Java Programs[C]∥2006 International Conference on Computational Intelligence and Security.2006:895-898.
[7] SU Q,WU W M,LI Z L,et al.Research and Application of ChaosOpaque Predicate in Code Obfuscation[J].Computer Science,2013,40(6):155-160.
[8] XIE X,LIU F,LU B,et al.Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates[C]∥Tenth International Conference on Computational Intelligence and Security.IEEE Computer Society,2014:524-528.
[9] WANG C X.A security architecture for survivability mecha-nisms[D].Charlottesville:University of Virginia,2001.
[10] COLLBERG C,NAGRA J.Surreptitious Software Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].Beijing:Post & Telecom Press,2012:204-205.
[11] MOSER A,KRUEGEL C,KIRDA E.Limits of Static Analysis for Malware Detection[C]∥Computer Security Applications Con-ference,2007.IEEE,2007:421-430.
[12] WU W M,LIN S M,LIN Z Y.chaotic-based opaque predicate control flow flatten algorithm[J].Computer Science,2015,42(5):178-182.
[13] GONZALOALVAREZ,SHUJUNLI.Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems[J].International Journal of Bifurcation & Chaos,2006,16(8):2129-2151.
[14] YUAN G N,QIN H L,LAI D S.Construct of Tent Map Stream Cipher on Square[J].Computer Engineering and Applications,2002,8(13):124-126.
[15] SCHUMACKER R,TOMEK S.Understanding Statistics Using R[M].Springer Publishing Company,Incorporated,2013.
[16] COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].http://sandmark.cs.arizona.edu.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!