Yuichiro Kanzaki and Akito Monden and Masahide Nakamura and Ken-ichi Matsumoto
Program Camouflage A Systematic Instruction Hiding Method for Protecting Secrets
2365 - 2371
2008
2
7
International Journal of Computer and Information Engineering
https://publications.waset.org/pdf/12648
https://publications.waset.org/vol/19
World Academy of Science, Engineering and Technology
This paper proposes an easytouse instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) selfmodification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and selfmodification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Open Science Index 19, 2008