Binary Obfuscation Based Reassemble

Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Software reverse engineering is the process of retrieving the source code or recovering the higher level structure from an executable binary file. It has a wide range of applications in software analysis, such as vulnerability mining and exploiting, blind patching and so on. But it can also be used for illegal activities such as software piracy and plagiarism, which bring huge losses to relevant workers. So Anti-reverse has important significance for intellectual property protection. In fact, it is difficult to protect a software against being reversed or malicious modifications.In this paper, we present and discuss a new binary obfuscation method based on reassemble. The binary reassembling refers to the process of disassembling an executable binaries into assembly code and assemble it back to a correct binary. We make binary obfuscation in this process because it can avoid many problems and have better protection than other obfuscation methods. We designed two obfuscating schemes including instruction substitution and control flow confusion. The resulting code is still a correct program, but it has more complex instruction execution sequence and sophisticated control flow graph. According to the experiment results, the obfuscated program has more smaller file size but it execute more slowly than the original program.

Original languageEnglish
Title of host publicationMALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages153-160
Number of pages8
ISBN (Electronic)9781728101538
DOIs
Publication statusPublished - 2 Jul 2018
Event13th International Conference on Malicious and Unwanted Software, MALWARE 2018 - Nantucket, United States
Duration: 22 Oct 201824 Oct 2018

Publication series

NameMALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software

Conference

Conference13th International Conference on Malicious and Unwanted Software, MALWARE 2018
Country/TerritoryUnited States
CityNantucket
Period22/10/1824/10/18

Fingerprint

Dive into the research topics of 'Binary Obfuscation Based Reassemble'. Together they form a unique fingerprint.

Cite this