2009 International Conference on Computational Science and Engineering 2009
DOI: 10.1109/cse.2009.43
|View full text |Cite
|
Sign up to set email alerts
|

Code Obfuscation Using Pseudo-random Number Generators

Abstract: We describe a novel method for malicious code obfuscation that uses code already present in systems: a pseudo-random number generator. This can also be seen as an antidisassembly and anti-debugging technique, depending on deploy-ment, because the actual code does not exist until run -it is generated dynamically by the pseudo-random number generator. A year's worth of experiments are used to demonstrate that this technique is a viable code obfuscation option for a malicious adversary with access to large amount… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The type of image that we used is a 24 bit true-color image; in this format each channel: red, green, or blue has a range of values from 0 to 255. For our proof of concept we hid first a message encoded in hexadecimal ( Figure 2b); as a second example we hid the obfuscated bytecode of a simple "hello world" Python program (Figure 2c) as defined in Aycock et al [8]. In our proposed schema the cover picture ( Figure 2a) is left unaltered, and since we are implementing a steganography keybased schema, the sender will transmit the cover picture and the stego-key to the receiver.…”
Section: Methodsmentioning
confidence: 98%
See 4 more Smart Citations
“…The type of image that we used is a 24 bit true-color image; in this format each channel: red, green, or blue has a range of values from 0 to 255. For our proof of concept we hid first a message encoded in hexadecimal ( Figure 2b); as a second example we hid the obfuscated bytecode of a simple "hello world" Python program (Figure 2c) as defined in Aycock et al [8]. In our proposed schema the cover picture ( Figure 2a) is left unaltered, and since we are implementing a steganography keybased schema, the sender will transmit the cover picture and the stego-key to the receiver.…”
Section: Methodsmentioning
confidence: 98%
“…Each one of these seeds was used to generate a subset of the message that we want to reconstruct later; recall that for this example the message was a set of hexadecimal numbers as in Figure 2 where the matching values compared to the original message in hexadecimal code (Figure 2 As with the earlier obfuscation method proposed by Aycock et al [8], it is possible to generate a message using PRNGs. This sequence of values is used later to obtaining the key we will transmit in our steganography procedure.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations