Metrics for code obfuscation based on symbolic execution and N-scope complexity

Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022085
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850073046220537856
author Yuqiang XIAO
Yunfei GUO
Yawen WANG
author_facet Yuqiang XIAO
Yunfei GUO
Yawen WANG
author_sort Yuqiang XIAO
collection DOAJ
description Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.
format Article
id doaj-art-c353cb4675724d5b9c1be187d60eddb7
institution DOAJ
issn 2096-109X
language English
publishDate 2022-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-c353cb4675724d5b9c1be187d60eddb72025-08-20T02:46:57ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-12-01812313459574682Metrics for code obfuscation based on symbolic execution and N-scope complexityYuqiang XIAOYunfei GUOYawen WANGCode obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022085code obfuscationobfuscation metricssymbolic executionN-scope
spellingShingle Yuqiang XIAO
Yunfei GUO
Yawen WANG
Metrics for code obfuscation based on symbolic execution and N-scope complexity
网络与信息安全学报
code obfuscation
obfuscation metrics
symbolic execution
N-scope
title Metrics for code obfuscation based on symbolic execution and N-scope complexity
title_full Metrics for code obfuscation based on symbolic execution and N-scope complexity
title_fullStr Metrics for code obfuscation based on symbolic execution and N-scope complexity
title_full_unstemmed Metrics for code obfuscation based on symbolic execution and N-scope complexity
title_short Metrics for code obfuscation based on symbolic execution and N-scope complexity
title_sort metrics for code obfuscation based on symbolic execution and n scope complexity
topic code obfuscation
obfuscation metrics
symbolic execution
N-scope
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022085
work_keys_str_mv AT yuqiangxiao metricsforcodeobfuscationbasedonsymbolicexecutionandnscopecomplexity
AT yunfeiguo metricsforcodeobfuscationbasedonsymbolicexecutionandnscopecomplexity
AT yawenwang metricsforcodeobfuscationbasedonsymbolicexecutionandnscopecomplexity