Skip to main content
Article thumbnail
Location of Repository

Program Camouflage: A Systematic Instruction Hiding Method for Protecting Secrets

By Yuichiro Kanzaki, Akito Monden, Masahide Nakamura and Ken-ichi Matsumoto

Abstract

Abstract—This paper proposes an easy-to-use instruction hiding method to protect software from malicious reverse engineering attacks. Given a source program (original) to be protected, the proposed method (1) takes its modified version (fake) as an input, (2) differences in assembly code instructions between original and fake are analyzed, and, (3) self-modification routines are introduced so that fake instructions become correct (i.e., original instructions) before they are executed and that they go back to fake ones after they are executed. The proposed method can add a certain amount of security to a program since the fake instructions in the resultant program confuse attackers and it requires significant effort to discover and remove all the fake instructions and self-modification routines. Also, this method is easy to use (with little effort) because all a user (who uses the proposed method) has to do is to prepare a fake source code by modifying the original source code. Keywords—Copyright protection, program encryption, program obfuscation, self-modification, software protection. I

Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.193.5390
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.waset.org/journals/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.