2016 IEEE European Symposium on Security and Privacy (EuroS&P) 2016
DOI: 10.1109/eurosp.2016.21
|View full text |Cite
|
Sign up to set email alerts
|

Translingual Obfuscation

Abstract: Abstract-Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages. Translingual obfuscation translates part of a program from its original language to another language which has a different programming paradigm and execution model, thus increasing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 55 publications
(66 reference statements)
0
6
0
Order By: Relevance
“…In contrast, evaluation through empirical experiments always raises concerns about the possibility that the obfuscation can be effectively nullified by some unknown or future deobfuscation methods not considered by the evaluation. Some recent effort has tried to establish standards for assessing the security strength of obfuscation techniques, but it remains unclear how well they can fit the demands of practical software protection.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, evaluation through empirical experiments always raises concerns about the possibility that the obfuscation can be effectively nullified by some unknown or future deobfuscation methods not considered by the evaluation. Some recent effort has tried to establish standards for assessing the security strength of obfuscation techniques, but it remains unclear how well they can fit the demands of practical software protection.…”
Section: Discussionmentioning
confidence: 99%
“…Domas developed a compiler, which generates a binary employing only the mov family instructions, based on the fact that x86 mov is Turing complete. Wang et al, Lan et al, and Wang et al obfuscated C programs by translating them into declarative languages or abstract computation models, making imperative‐oriented analysis heuristics much less effective. There are also obfuscation methods that are less dependent on special software and hardware features but utilize more general techniques like compression, encryption, and virtualization .…”
Section: Related Workmentioning
confidence: 99%
“…These metrics have been proved to be able to evaluate the complexity of the obfuscated code and have been widely used to evaluate obfuscation techniques in related work. [55], [8], [13].…”
Section: Annotation Dataset Construction 1) Construct Obfuscation Samplesmentioning
confidence: 99%
“…7, such techniques include code translation, VM(virtual machine)-based obfuscation, decompilation prevention, and diversification. Wang et al (2016) proposed translingual obfuscation, which introduces obscurity by translating the programs written in C into ProLog before compilation. Because ProLog adopts a different program paradigm and execution model from C, the generated binaries should become harder to understand.…”
Section: Software-component-layer Obfuscationmentioning
confidence: 99%