CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption

سال انتشار: 1398
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 211

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JCSE-6-2_002

تاریخ نمایه سازی: 19 بهمن 1399

چکیده مقاله:

Obfuscation, as one invasive strategy, is considered to be a defense strategy in the field of software and vital information protection against security threats. This paper proposes a new dynamic obfuscation method, called CSE, based on combining a triplet of control flow, signals and encryption of the management table (MT). This triplet exchanges and hides the control graph program. Then, it produces the MT that includes addresses to guide communication between instructions. A type of the stream cipher symmetric encryption (Spritz) applies to encrypt the MT. Also, a multi-objective function (the ability and the resiliency) based on six implementation metrics and two classic objective functions (the cost and the Mishra) are considered to evaluate the proposed obfuscation method. Therefore, the proposed triplet obfuscation method and the multi-objective functions are performed on a small program and a benchmark dataset. The results of our evaluations show that CSE has competitive advantages in comparison with other methods.

نویسندگان

Bahare Hashemzade

Department of Electrical and Computer Engineering, University of Torbat Heydarieh, Iran.

Majid Abdolrazzagh-Nezhad

Abolmatakher Str. - Bozorgmehr University of Qaenat.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • D. Maiorca, D. Ariu, I. Corona, M. Aresu, and G. Giacinto. Stealth attacks: An extended ...
  • S. Schrittwieser and S. Katzenbeisser. Code obfuscation against static and dynamic reverse ...
  • C. Barría, D. Cordero, C. Cubillos, and M. Palma. Proposed classification of malware, based ...
  • B. Hashemzade and A. Maroosi. Hybrid Obfuscation Using Signals and Encryption. Journal ...
  • S. Hosseinzadeh, S. Rauti, S. Laurén, J. Mäkelä, J. Holvitie, S. Hyrynsalmi, and V. Leppänen. Diversification and ...
  • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious ...
  • S. Romano, C. Vendome, G. Scanniello, and D. Poshyvanyk. A multi-study investigation into dead ...
  • A. J. Smith, R. F. Mills, A. R. Bryant, G. L. Peterson, and M. R. ...
  • O. Mirzaei, de J. M. Fuentes, J. Tapiador, and L. Gonzalez-Manzano. AndrODet: An adaptive Android obfuscation ...
  • S. Alrabaee, L. Wang, and M. Debbabi. BinGold: Towards robust binary analysis by ...
  • J. Ge, S. Chaudhuri, and A. Tyagi. Control flow based obfuscation. In Proceedings ...
  • I. You and K. Yim. Malware Obfuscation Techniques: A Brief Survey. In ...
  • E. Konstantinou and S. Wolthusen. Metamorphic virus: Analysis and detection. Technical report, ...
  • A. Cimitile, F. Martinelli, F. Mercaldo, V. Nardone, and A. Santone. Formal methods meet mobile ...
  • C. Chen, M. Hasan, A. Ghassami, S. Mohan, and N. Kiyavash. REORDER: Securing Dynamic-Priority Real-Time ...
  • Z. Guo, X. Xu, M. M. Tehranipoor, and D. Forte. EOP: An Encryption-Obfuscation Solution ...
  • N. Bitansky and V. Vaikuntanathan. Indistinguishability obfuscation from functional encryption. Journal of ...
  • I. V. Popov, S. K. Debray, and G. R. Andrews. Binary Obfuscation Using ...
  • C. K. Behera and D. L. Bhaskari. Code obfuscation by using floating ...
  • S. Alam, I. Sogukpinar, I. Traore, and R. N. Horspool. Sliding window and control ...
  • G. Shanmugam, R. M. Low, and M. Stamp. Simple substitution distance and metamorphic ...
  • A. H. Toderici and M. Stamp. Chi-squared distance and metamorphic virus detection. ...
  • N. Runwal, R. M. Low, and M. Stamp. Opcode graph similarity and metamorphic ...
  • B. B. Rad, M. Masrom, and S. Ibrahim. Opcodes histogram for classifying metamorphic ...
  • T. H. Austin, E. Filiol, S. Josse, and M. Stamp. Exploring hidden markov models ...
  • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical ...
  • S. Martinez. Source code obfuscation by mean of evolutionary algorithms. Internship ...
  • P. OKane, S. Sezer, and K. McLaughlin. Obfuscation: The hidden malware. Journal in ...
  • R. L. Rivest and J. C. Schuldt. Spritz-a spongy RC4-like stream cipher ...
  • S. Alam, R. N. Horspool, I. Traore, and I. Sogukpinar. A framework for metamorphic ...
  • I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas. Opcode sequences as representation ...
  • A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, and Y. Elovici. Detecting unknown malicious code ...
  • P. OKane, S. Sezer, and K. McLaughlin. Methods for obfuscating Java programs. Journal ...
  • W. Wong and M. Stamp. Hunting for metamorphic engines. Journal in Computer ...
  • نمایش کامل مراجع