Proceedings of the 50th Annual Southeast Regional Conference 2012
DOI: 10.1145/2184512.2184543
|View full text |Cite
|
Sign up to set email alerts
|

Instruction embedding for improved obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Obfuscation [5] is a traditional method of software protection, such as control flow expansion [6], garbage code insertion [7], instruction deformation [8], binary code encryption and packaging [9], and virtualization obfuscation [10]. These code obfuscation techniques are now common in malware, which make it difficult to discover the true logic of the program and give the security analyst an incredibly hard time.…”
Section: Code Obfuscationmentioning
confidence: 99%
“…Obfuscation [5] is a traditional method of software protection, such as control flow expansion [6], garbage code insertion [7], instruction deformation [8], binary code encryption and packaging [9], and virtualization obfuscation [10]. These code obfuscation techniques are now common in malware, which make it difficult to discover the true logic of the program and give the security analyst an incredibly hard time.…”
Section: Code Obfuscationmentioning
confidence: 99%
“…Linn et al designed an obfuscation to thwart linear sweep and recursive traversal static disassembly algorithms [23], which introduced junk instructions, jump tables, and opaque predicates to disrupt the static disassembly process. Ledoux et al proposed an instruction embedding method to improve instruction overlapping obfuscation [24]. Batchelder et al presented layout obfuscation algorithm to make Java decompilers fail to produce legal source code or crash completely [25].…”
Section: Related Workmentioning
confidence: 99%
“…Each technique uses a different method to confuse the automated disassembly tool in successfully disassembling the binary program. Some of the binary obfuscation methods like signal based obfuscation [15], dynamic code mutation [16], dummy variables based obfuscation [17], mimimorphic obfuscation [18], virtual machine based obfuscation [19] and instruction embedding obfuscation [20] are discussed in this section.…”
Section: Related Workmentioning
confidence: 99%
“…Embedding instructions in the program execution path [20] is another mechanism used to achieve obfuscation. The basic idea of this method is embedding hexadecimal bytes in the program execution path so that these bytes overlap with the assembly instructions in the original code creating new instructions.…”
Section: Related Workmentioning
confidence: 99%