Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) 2013
DOI: 10.2991/iccnce.2013.37
|View full text |Cite
|
Sign up to set email alerts
|

Branch Obfuscation Using Binary Code Side Effects

Abstract: The path constraints are leaked by binary conditional jump instructions which are the binary representation of software's internal logic. Based on the problem of software's path constraints leaking, reverse engineering using path-sensitive techniques such as symbolic execution and theorem proving poses a new threat to software intellectual property protection. In order to mitigate path information leaking problem, this paper proposed a novel branch obfuscation scheme that uses binary code side effects to hide … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 27 publications
0
0
0
Order By: Relevance