TY - GEN
T1 - A control flow obfuscation method to discourage malicious tampering of software codes
AU - Huang, Yu-Lun
AU - Ho, F. S.
AU - Tsai, H. Y.
AU - Kao, H. M.
PY - 2006/12/1
Y1 - 2006/12/1
N2 - The paper presents a control flow obfuscation method to discourage reverse engineering and malicious tampering of software codes. Given the original source codes and desired obfuscation criteria, the proposed method works by decomposing the source codes into fragments and then applying various transforms to the code fragments. As the output of our method, the transformed fragments are re-assembled and obfuscated with the designated obfuscation criteria. Moreover, since only control flows are obfuscated with a sequence of transformations that produce equivalent results of the original fragments, the final output can still preserve the same execution results as the original codes. The proposed method can be combined with other security technologies like watermarking or fingerprinting and thus help discouraging software piracy by making watermarked information embedded in software codes difficult to be reverse engineered or tampered.
AB - The paper presents a control flow obfuscation method to discourage reverse engineering and malicious tampering of software codes. Given the original source codes and desired obfuscation criteria, the proposed method works by decomposing the source codes into fragments and then applying various transforms to the code fragments. As the output of our method, the transformed fragments are re-assembled and obfuscated with the designated obfuscation criteria. Moreover, since only control flows are obfuscated with a sequence of transformations that produce equivalent results of the original fragments, the final output can still preserve the same execution results as the original codes. The proposed method can be combined with other security technologies like watermarking or fingerprinting and thus help discouraging software piracy by making watermarked information embedded in software codes difficult to be reverse engineered or tampered.
KW - Control flow obfuscation
KW - Intellectual property protection
KW - Reverse engineering
KW - Software obfuscation
KW - Tamper-resistance
UR - http://www.scopus.com/inward/record.url?scp=34247386348&partnerID=8YFLogxK
U2 - 10.1145/1128817.1128878
DO - 10.1145/1128817.1128878
M3 - Conference contribution
AN - SCOPUS:34247386348
SN - 1595932720
SN - 9781595932723
T3 - Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
BT - Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
T2 - 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
Y2 - 21 March 2007 through 24 March 2007
ER -