计算机科学 ›› 2009, Vol. 36 ›› Issue (8): 89-91.
• 计算机网络与信息安全 • 上一篇 下一篇
孙国梓 陈丹伟 蔡强
出版日期:
发布日期:
基金资助:
SUN Guo-zi , CHEN Dan-wei , CAI Qiang
Online:
Published:
摘要: 花指令模糊变换是代码模糊变换策略中的一种有效方法。在分析现有花指令加密方法的基础上,提出一种子程序花指令模糊变换方案,并利用形式化方法对其进行描述。通过研究子程序花指令模糊变换各种形式化的定义,推导出若干引理,从“XOR及CMP扩展”、“伪分支构造”,"JNE后加花指令”等3个方面加以形式化的证明,使得经上述子程序花指令模糊变换的程序具有与原程序相同的逻辑性。最后,以代码模糊变换评测标准对该算法的效果进行了详细分析。
关键词: 代码模糊变换,逻辑一致性,花指令,反汇编
Abstract: Junk code transformation is an effective approach for the code obfuscation. Based on the analysis of current junk code strategies,the paper proposed a novel junk code encryption algorithm within sub-function and described the algorithm using formal language. With formalization method, the paper researched how to prove the logic consistency of junk code transformation within sub-function. We deduced some important lemmas after researching the formal definilion of junk code transformation within sub-function. With these lemmas, the paper proven from three aspects ("XOR and CMP Expand","Pseudo Embranchment Construction" and "Junk Code after JNE") that the program transformed by junk code algorithm within sub-function has the same logicality with its original one. At last, with the standard of the codcobfuscation's judgment,the paper gave the result of the algorithm in detailed analyzing.
Key words: Code obfuscation,Logic consistency,Junk code,Disassemble
孙国梓 陈丹伟 蔡强. 子程序花指令模糊变换逻辑一致性研究[J]. 计算机科学, 2009, 36(8): 89-91. https://doi.org/
SUN Guo-zi , CHEN Dan-wei , CAI Qiang. Research on Logic Consistency of Junk Code Transformation within Sub-function[J]. Computer Science, 2009, 36(8): 89-91. https://doi.org/
0 / / 推荐
导出引用管理器 EndNote|Reference Manager|ProCite|BibTeX|RefWorks
链接本文: https://www.jsjkx.com/CN/
https://www.jsjkx.com/CN/Y2009/V36/I8/89
Cited