计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 155-159.

• 软件与数据库技术 • 上一篇    下一篇

混沌不透明谓词在代码混淆中的研究与应用

苏庆,吴伟民,李忠良,李景樑,陈为德   

  1. 广东工业大学计算机学院 广州510006;广东工业大学计算机学院 广州510006;广东工业大学计算机学院 广州510006;广东工业大学计算机学院 广州510006;广东工业大学计算机学院 广州510006
  • 出版日期:2018-11-16 发布日期:2018-11-16

Research and Application of Chaos Opaque Predicate in Code Obfuscation

SU Qing,WU Wei-min,LI Zhong-liang,LI Jing-liang and CHEN Wei-de   

  • Online:2018-11-16 Published:2018-11-16

摘要: 通过改进Logistic混沌映射,提出了En_Logistic映射,将该映射应用到不透明谓词簇的构造过程中,形成混沌不透明谓词。将混沌不透明谓词应用于代码混淆过程。分别给出在程序分支判断点处和在顺序执行语句块中插入混沌不透明谓词的方法。对应用不透明谓词进行代码混淆的过程给出了程序复杂度评价以及控制流复杂度评价。安全性分析表明,混沌不透明谓词具备对抗动、静态攻击的安全性,并通过实验验证了其在代码混淆应用中的效果。

关键词: 混沌理论,Logistic映射,En_Logistic映射,不透明谓词,代码混淆,软件保护

Abstract: Constructing the safety opaque predicate is the major issue in code obfuscation and the key to it lies in using opaque predicates.In order to form a chaotic opaque predicate,the En_Logistic was proposed through improving the Logistic chaotic,and then it was applied to the construction of the opaque predicate clusters.The chaotic opaque was applied in the code obfuscation process.In this experiment,different methods of inserting chaos opaque predicate into program branches and sequence blocks were given.The program complexity evaluation and the control flow complexity evaluation were given in the application process of code obfuscation.Additionally,security analysis shows that the chaotic opaque predicate has higher security in fighting against static attacks,as well as the dynamic.And better effectiveness in the code obfuscation is verified in this experiment.

Key words: Chaos theory,Logistic mapping,En_Logistic mapping,Opaque predicate,Code obfuscation,Software protection

[1] 楼俊钢,江建慧,帅春燕,等.软件可靠性模型研究进展[J].计算机科学,2010,7(9):13-17
[2] 史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报,2005,3(6):813-819
[3] 付剑晶.代码干扰变换在软件保护中的使用[J].计算机应用与软件,2008,5(4):103-105
[4] 贾春福,王志,刘昕,等.路径模糊:一种有效抵抗符号执行的二进制混淆技术[J].计算机研究与发展,2011,8(11):2111-2119
[5] 袁征,冯雁,温巧燕,等.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,0(6):103-106
[6] Yuan Zheng,Wen Qiao-yan,Wu Wen-ling,et al.An ID-based watermarking scheme for java programs[C]∥EUC Workshops,2006.Berlin:Springer-Verlag,2006:848-857
[7] 袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004,7(2):257-262
[8] Cormen T H,Leiserson C E,Rivest R L,et al.Introduction to Algorithms [M].The MIT Press,2009
[9] 赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,3(3):700-711
[10] Collberg C.A Tool for the Study of Software Protection Algorithms[EB/OL].http://sandmark.cs.arizona.edu,2012-05-24

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!