Program Camouflage: A Systematic Instruction Hiding Method for Protecting Secrets
نویسندگان
چکیده
This paper proposes an easy-to-use instruction hiding method to protect software from malicious reverse engineering attacks. Given a source program (original) to be protected, the proposed method (1) takes its modified version (fake) as an input, (2) differences in assembly code instructions between original and fake are analyzed, and, (3) self-modification routines are introduced so that fake instructions become correct (i.e., original instructions) before they are executed and that they go back to fake ones after they are executed. The proposed method can add a certain amount of security to a program since the fake instructions in the resultant program confuse attackers and it requires significant effort to discover and remove all the fake instructions and self-modification routines. Also, this method is easy to use (with little effort) because all a user (who uses the proposed method) has to do is to prepare a fake source code by modifying the original source code. Keywords—Copyright protection, program encryption, program obfuscation, self-modification, software protection.
منابع مشابه
A Software Protection Method Based on Instruction Camouflage
This paper presents a method in which program analysis by a malicious user (attacker) is made difficult by camouflaging (hiding) a large number of instructions contained in the program. In the proposed method, an arbitrary instruction (target) in the program is camouflaged by a different instruction. Using the self-modification mechanism in the program, the original instruction is restored only...
متن کاملSex education programs for children and adolescents: A Systematic Review
Sex education is considered as one of the main aspect of education that overlook in Iran. There were many challenges against application of sex education programs. We used systematic review for answering three questions related to definition and conceptualization of sex education, sex education curriculum and skills and investigating the effectiveness of these programs. Findings of this study s...
متن کاملBounds on the Leakage of the Input's Distribution in Information-Hiding Protocols
In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by re...
متن کاملHigh-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography
This work proposes a new and non-blind steganographic scheme for synthesized pitches. Synthesized music is popularly used to demonstrate early versions of compositions conveniently and at low-cost. They can also be utilized to pass secrets or obtain digital rights. The method consists of two procedures, of which the first is the realistic simulation of synthesized pitches using a computer and t...
متن کاملRecursive Information Hiding of Secrets by Random Grids
This article presents the method of recursive information hiding of secret images by random grids, which hides the additional secret information in the shares of the larger secret in a recursive manner. The proposed method increases the information conveyed per bit of the shares to nearly 100 percent, and has the size of each share the same as that of the original secret image without any expan...
متن کامل