Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the code so that it is unreadable or in an incomprehensible format. Since the objective of this article is to make a program obfuscated, the source code shall appear like normal native code and should be perfectly readable. As nobody can guess that the code is an obfuscated one, obviously it will be very tough to analyze. Nowadays, a lot of programs protect themselves from being analyzed by hiding their behaviors or compressing their semantics by using obfuscation techniques. On the contrary, self-modifying code (SMC) can challenge one's intellect to discover the real intrinsic meaning of the source code as it is difficult and strenuous to analyze, since the code gets modified dynamically during runtime. Hence, this article brings into play the underlying concepts of self-modifying codes for obfuscating the programs to construct a much better code protection model. Some techniques like indirect memory addressing, register renaming, direction-changing of instructions, segment ignoring, modification of registry content and many more are expounded in this article by using Assembly-level language, which is binary obfuscation.
Year of publication: |
2017
|
---|---|
Authors: | Behera, Chandan Kumar ; Bhaskari, D. Lalitha |
Published in: |
International Journal of Secure Software Engineering (IJSSE). - IGI Global, ISSN 1947-3044, ZDB-ID 2703749-6. - Vol. 8.2017, 3 (01.07.), p. 24-41
|
Publisher: |
IGI Global |
Subject: | Code Obfuscation Techniques | Code Transformation | Dynamic Code Obfuscation | Self-Modifying Code |
Saved in:
Online Resource
Saved in favorites
Similar items by person
-
Malware Methodologies and Its Future: A Survey
Behera, Chandan Kumar, (2017)
-
Beyond credit cards : A TEP perspective on buy-now-pay-later adoption
Dadra, Ritika, (2024)
-
Two decades of mobile payment research : a systematic review using the TCCM approach
Behera, Chandan Kumar, (2024)
- More ...