Computer Engineering and Applications ›› 2012, Vol. 48 ›› Issue (11): 60-64.

Previous Articles     Next Articles

Algorithm of code obfuscation technology based?on flow graphs converted

WANG Yibin1, CHEN Yiyun2   

  1. 1.School of Computer and Information, Anqing Normal University, Anqing, Anhui 246011, China
    2.College of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China
  • Online:2012-04-11 Published:2012-04-16



  1. 1.安庆师范学院 计算机与信息学院,安徽 安庆 246011
    2.中国科学技术大学 计算机科学与技术学院,合肥 230027

Abstract: In recent years, code obfuscation has attracted attention as a low cost approach to improve software security by making it difficult for attackers to understand the inner workings of proprietary software systems. It is very important to propose code obfuscation technology for protecting software. Code obfuscation technology may protect program code and core algorithm. The basic content of code obfuscation is summarized. The relation knowledge of basic block and flow graphs is presented. The obfuscating transformation algorithm of converted reducible flow graphs to non-reducible flow graphs is described in detail. The algorithm efficiency is analyzed.

Key words: code obfuscation, reducible flow graphs, non-reducible flow graphs, control flow transformation

摘要: 为了提高软件的安全性,常使攻击者难以理解专利软件系统内部的工作机制,代码迷惑技术因其代价低廉而越来越受到人们的重视。代码迷惑技术的提出对于软件保护具有非常重要的意义,代码迷惑技术的使用可以对程序代码及核心算法进行保护。简要概述了代码迷惑技术基本内容,阐述了基本块和流图的相关知识,给出了可归约流图变换为不可归约流图的迷惑变换具体的算法及实验结果,并对算法的有效性进行了分析。

关键词: 代码迷惑, 可归约流图, 不可归约流图, 控制流变换