Presentation | 2003/3/19 Program Obfuscation by Coding Data and Its Operation Hirotsugu SATO, Akito MONDEN, Ken-ichi MATSUMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Protecting a program against illegal hacking and manipulations is a crucial problem for the software industry. For this purpose, this paper proposes a systematic method to obfuscate a program by applying a specific transformation to data and operators in the program. The proposed method consists of the following three steps : (1) encode each data (operand) appearing in a given expression, (2) replace operators in the expression, so that the evaluated value of the expression becomes an encoded value, (3) decode the encoded value when required. We present a set of operator transformation rules applied to data encoding based on linear transformation. In the program obtained by the proposed method. the operators are applieddirectly to the encoded data, and thus, the data is observed in the program stack as an "encode" value. Therefore, the proposed method is especially effective for the program hacking based on stack monitoring at run-time. As a rsult, it can be applied effectively to protecting software systems with security-related components, such as decrypt keys, decoding algorithms, authentication. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Software Protection / Hiding Data and Its Operation / Reverse Engineering |
Paper # | IT2002-49,ISEC2002-107,SST2002-155,ITS2002-132 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2003/3/19(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Program Obfuscation by Coding Data and Its Operation |
Sub Title (in English) | |
Keyword(1) | Software Protection |
Keyword(2) | Hiding Data and Its Operation |
Keyword(3) | Reverse Engineering |
1st Author's Name | Hirotsugu SATO |
1st Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology() |
2nd Author's Name | Akito MONDEN |
2nd Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology |
3rd Author's Name | Ken-ichi MATSUMOTO |
3rd Author's Affiliation | Graduate School of Information Science, Nara Institute of Science and Technology |
Date | 2003/3/19 |
Paper # | IT2002-49,ISEC2002-107,SST2002-155,ITS2002-132 |
Volume (vol) | vol.102 |
Number (no) | 743 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |