Presentation 2003/3/19
Program Obfuscation by Coding Data and Its Operation
Hirotsugu SATO, Akito MONDEN, Ken-ichi MATSUMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Protecting a program against illegal hacking and manipulations is a crucial problem for the software industry. For this purpose, this paper proposes a systematic method to obfuscate a program by applying a specific transformation to data and operators in the program. The proposed method consists of the following three steps : (1) encode each data (operand) appearing in a given expression, (2) replace operators in the expression, so that the evaluated value of the expression becomes an encoded value, (3) decode the encoded value when required. We present a set of operator transformation rules applied to data encoding based on linear transformation. In the program obtained by the proposed method. the operators are applieddirectly to the encoded data, and thus, the data is observed in the program stack as an "encode" value. Therefore, the proposed method is especially effective for the program hacking based on stack monitoring at run-time. As a rsult, it can be applied effectively to protecting software systems with security-related components, such as decrypt keys, decoding algorithms, authentication.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Software Protection / Hiding Data and Its Operation / Reverse Engineering
Paper # IT2002-49,ISEC2002-107,SST2002-155,ITS2002-132
Date of Issue

Conference Information
Committee ISEC
Conference Date 2003/3/19(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Program Obfuscation by Coding Data and Its Operation
Sub Title (in English)
Keyword(1) Software Protection
Keyword(2) Hiding Data and Its Operation
Keyword(3) Reverse Engineering
1st Author's Name Hirotsugu SATO
1st Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology()
2nd Author's Name Akito MONDEN
2nd Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology
3rd Author's Name Ken-ichi MATSUMOTO
3rd Author's Affiliation Graduate School of Information Science, Nara Institute of Science and Technology
Date 2003/3/19
Paper # IT2002-49,ISEC2002-107,SST2002-155,ITS2002-132
Volume (vol) vol.102
Number (no) 743
Page pp.pp.-
#Pages 6
Date of Issue