Computer Science ›› 2013, Vol. 40 ›› Issue (6): 155-159.

Previous Articles     Next Articles

Research and Application of Chaos Opaque Predicate in Code Obfuscation

SU Qing,WU Wei-min,LI Zhong-liang,LI Jing-liang and CHEN Wei-de   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Constructing the safety opaque predicate is the major issue in code obfuscation and the key to it lies in using opaque predicates.In order to form a chaotic opaque predicate,the En_Logistic was proposed through improving the Logistic chaotic,and then it was applied to the construction of the opaque predicate clusters.The chaotic opaque was applied in the code obfuscation process.In this experiment,different methods of inserting chaos opaque predicate into program branches and sequence blocks were given.The program complexity evaluation and the control flow complexity evaluation were given in the application process of code obfuscation.Additionally,security analysis shows that the chaotic opaque predicate has higher security in fighting against static attacks,as well as the dynamic.And better effectiveness in the code obfuscation is verified in this experiment.

Key words: Chaos theory,Logistic mapping,En_Logistic mapping,Opaque predicate,Code obfuscation,Software protection

[1] 楼俊钢,江建慧,帅春燕,等.软件可靠性模型研究进展[J].计算机科学,2010,7(9):13-17
[2] 史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报,2005,3(6):813-819
[3] 付剑晶.代码干扰变换在软件保护中的使用[J].计算机应用与软件,2008,5(4):103-105
[4] 贾春福,王志,刘昕,等.路径模糊:一种有效抵抗符号执行的二进制混淆技术[J].计算机研究与发展,2011,8(11):2111-2119
[5] 袁征,冯雁,温巧燕,等.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,0(6):103-106
[6] Yuan Zheng,Wen Qiao-yan,Wu Wen-ling,et al.An ID-based watermarking scheme for java programs[C]∥EUC Workshops,2006.Berlin:Springer-Verlag,2006:848-857
[7] 袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004,7(2):257-262
[8] Cormen T H,Leiserson C E,Rivest R L,et al.Introduction to Algorithms [M].The MIT Press,2009
[9] 赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,3(3):700-711
[10] Collberg C.A Tool for the Study of Software Protection Algorithms[EB/OL].http://sandmark.cs.arizona.edu,2012-05-24

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!