计算机科学 ›› 2017, Vol. 44 ›› Issue (12): 114-114.doi: 10.11896/j.issn.1002-137X.2017.12.022

• 信息安全 • 上一篇    下一篇

基于混沌不透明表达式的不透明谓词混淆技术研究

苏庆,孙金田   

  1. 广东工业大学计算机学院 广州510006,广东工业大学计算机学院 广州510006
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61273118),广东省科技计划(2016A010101027,3B022200004),广州市科技计划(201605101034176)资助

Research on Opaque Predicate Obfuscation Technique Based on Chaotic Opaque Expression

SU Qing and SUN Jin-tian   

  • Online:2018-12-01 Published:2018-12-01

摘要: 为了更好地进行代码混淆,提出了一种基于混沌映射和二次映射的混沌不透明表达式构造方法。根据混沌不透明表达式的定义,采用具有初值敏感依赖性、伪随机性、状态空间均匀分布性、多分支性和无特殊符号等性质的混沌映射。以二维帐篷映射为例,创建与之相匹配的二次映射,将混沌映射的运行状态空间映射至表达式的结果空间,以进行混沌不透明表达式的构造。将混沌不透明表达式与不透明谓词相结合,形成了一种新的不透明谓词构造方法,同时提出了一种新构造谓词与原有谓词融合于一体的不透明谓词插入方法,两者结合形成了一种新型的不透明谓词混淆技术。实验结果表明,该技术令各项软件的复杂度指标都有明显的提升,并且增加的程序开销较小。

关键词: 代码混淆,混沌映射,混沌不透明表达式,二维帐篷映射,不透明谓词

Abstract: In order to improve the code confusion,a chaotic opaque expression construction method based on chaotic map and quadratic map was proposed.According to the definition of chaotic opaque expression,the chaotic map with the properties of initial value sensitive dependence,pseudo-randomness,uniform distribution of state space,multiple bran-ching and non-special symbols is used.Taking two-dimensional tent map as an example,the matched quadratic map maps the running state space of the chaotic map to the result space of the expression to construct a chaotic opaque expression.Combining chaotic opaque expression with opaque predicate,a new method for constructing opaque predicate is formed.At the same time,an opaque predicate insertion method was proposed in which a new construction predicate is merged with an original predicate.The combination of the both forms a new opaque predicate obfuscation technique.The experimental results show that the technique has obvious improvement in various software complexity indexes,and the cost of the program is relatively lower.

Key words: Code obfuscation,Chaotic map,Chaotic opaque expression,Two-dimensional tent map,Opaque predicate

[1] PREDA M D,GIACOBAZZI R.Control Code Obfuscation byAbstract Interpretation[C]∥IEEE International Conference on Software Engineering and Formal Methods.IEEE Xplore,2005:301-310.
[2] ZHAO Y J,TANG Z Y,WANG I.Evaluation of code obfuscating Transformation[J].Journal of Software,2012,23(3):700-711.
[3] COLLBERG C,THOMBORSON C D.Low manufacturing cheap,resilient,and stealthy opaque constructs[C]∥Proceeding of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.California:ACM,1998:184-196.
[4] ARBOIT G.A method for watermarking java programs viaopaque predicates[C]∥The Fifth International Conference on Electronic Commerce Research (ICECR-5).2002:102-110.
[5] MYLES G,COLLBERG C.Software watermarking via opaquepredicates:implementation,analysis,and attacks[J].Electron Commerce Research,2006,4(6):155-171.
[6] YUAN Z,WEN Q,MAO M.Constructing Opaque Predicatesfor Java Programs[C]∥2006 International Conference on Computational Intelligence and Security.2006:895-898.
[7] SU Q,WU W M,LI Z L,et al.Research and Application of ChaosOpaque Predicate in Code Obfuscation[J].Computer Science,2013,40(6):155-160.
[8] XIE X,LIU F,LU B,et al.Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates[C]∥Tenth International Conference on Computational Intelligence and Security.IEEE Computer Society,2014:524-528.
[9] WANG C X.A security architecture for survivability mecha-nisms[D].Charlottesville:University of Virginia,2001.
[10] COLLBERG C,NAGRA J.Surreptitious Software Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].Beijing:Post & Telecom Press,2012:204-205.
[11] MOSER A,KRUEGEL C,KIRDA E.Limits of Static Analysis for Malware Detection[C]∥Computer Security Applications Con-ference,2007.IEEE,2007:421-430.
[12] WU W M,LIN S M,LIN Z Y.chaotic-based opaque predicate control flow flatten algorithm[J].Computer Science,2015,42(5):178-182.
[13] GONZALOALVAREZ,SHUJUNLI.Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems[J].International Journal of Bifurcation & Chaos,2006,16(8):2129-2151.
[14] YUAN G N,QIN H L,LAI D S.Construct of Tent Map Stream Cipher on Square[J].Computer Engineering and Applications,2002,8(13):124-126.
[15] SCHUMACKER R,TOMEK S.Understanding Statistics Using R[M].Springer Publishing Company,Incorporated,2013.
[16] COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].http://sandmark.cs.arizona.edu.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!