• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2016 Vol.8(4): 303-312 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2016.V8.1063

An Iteration Obfuscation Based on Instruction Fragment Diversification and Control Flow Randomization

Xin Xie, Fenlin Liu, Bin Lu, and Fei Xiang
Abstract—As the control flow graph can reflect the logic structure of programs, static and dynamic reverse methods are used to analyze the logic structure and instruction sequence, and the existing methods of control flow obfuscation have low potency to resist reverse attacks. To solve this problem, we propose an obfuscation method based on instruction fragment diversification and control flow randomization, diversified instruction fragments are generated by various equivalent transformation rules, and random functions are used to select one execution path from the multi-way branches of programs, then programs are iteratively obfuscated. Experiments and analysis show that diversified instruction fragments and multi-way branches can increase the difficulty of static reverse analysis, random selection for multi-way branches will increase the difficulty of dynamic instruction tracing, and iterative transformation for many times enhances the complexity of control flow graph.

Index Terms—Code obfuscation, iterative transformation, instruction fragment diversification, control flow randomization.

Xin Xie is with Zhengzhou Information Science and Technology Institute, and the State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan 450002, China (e-mail: xiexin0011@gmail.com).
Fenlin Liu, Bin Lu, and Fei Xiang are with Zhengzhou Information Science and Technology Institute, China (e-mail: liufenlin@vip.sina.com, stoneclever@gmail.com, xiangfei2012@tsinghua.org.cn).

[PDF]

Cite:Xin Xie, Fenlin Liu, Bin Lu, and Fei Xiang, "An Iteration Obfuscation Based on Instruction Fragment Diversification and Control Flow Randomization," International Journal of Computer Theory and Engineering vol. 8, no. 4, pp. 303-312, 2016.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com