期刊文献+

一种基于混沌不透明谓词的压扁控制流算法 被引量:10

Chaotic-based Opaque Predicate Control Flow Flatten Algorithm
下载PDF
导出
摘要 提出了一种基于混沌不透明谓词的压扁控制流算法。该算法将一种新的基于Arnold cat二维混沌映射的N态不透明谓词的构造方法用于改进压扁控制流混淆算法的全局索引变量,并开发了一个基于该算法的JavaScript脚本混淆系统。通过对混淆前后JavaScript程序的静动态分析证明了该混淆算法具有正确性和有效性,同时还能提高混淆后程序的安全性。 A control flow flatten algorithm based on chaotic opaque predicate was proposed. This algorithm applies a new construction method of N-state opaque predicates based on Arnold cat planar chaos mapping to improve the global index variable of control flatten flow obfuscation algorithm. A JavaScript obfuscation system was developed depending on this algorithm. Static and dynamic analysis of codes before and after obfuscating proves that the algorithm is correct and effective,and improves obfuscated coders security
出处 《计算机科学》 CSCD 北大核心 2015年第5期178-182,共5页 Computer Science
基金 广东高校优秀青年创新人才培养计划项目(2012LYM_0054) 广州市科技计划项目(2012Y2-00046 2013Y2-00043)资助
关键词 ARNOLD cat二维混沌映射 N态不透明谓词 压扁控制流算法 JAVASCRIPT Arnold cat planar chaos mapping, N-States opaque predicate,Control flow flatten algoritbm,JavaScript
  • 相关文献

参考文献17

  • 1Collberg C,Thomborson J,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,The University of Auckland,1997.
  • 2Wang Chen-xi.A security architecture for survivability mechanisms[D].Charlottesville:University of Virginia,2001.
  • 3Borello J M,Mé L.Code Obfuscation Techniques for Metamorphic Viruses[J].Journal of Computer Virology,2008,4(3):211-220.
  • 4Weaver N,Paxson V,Staniford S,et al.A Taxonomy of Computer Worms[C]∥Proceedings of the 2003 ACM workshop on Rapid malcode,Washington DC,USA,2003.ACM Press,2003:11-18.
  • 5Collberg C,Nagra J.Surreptitious Software Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].Beijing:POST&TELECOM PRESS,2012:188-191.
  • 6袁征,冯雁,温巧燕,张华.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,30(6):103-106. 被引量:9
  • 7Arboit G.A method for watermarking java programs via opaque predicates[C]∥The Fifth International Conference on Electronic Commerce Research (ICECR-5).2002:102-110.
  • 8苏庆,吴伟民,李忠良,李景樑,陈为德.混沌不透明谓词在代码混淆中的研究与应用[J].计算机科学,2013,40(6):155-159. 被引量:16
  • 9Matthews R.On the derivation of a "chaotic" encryption algorithm[J].Cryptologia,1989,13(1):29-42.
  • 10Dawei Z,Guanrong C,Wenbo L.A chaos-based robust wavelet-domain watermarking algorithm[J].Chaos,Solitons & Fractals,2004,22(1):47-54.

二级参考文献46

  • 1林雪辉,蔡利栋.基于Hilbert曲线的数字图像置乱方法研究[J].中国体视学与图像分析,2004,9(4):224-227. 被引量:52
  • 2史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 3陈铭,平西建.基于Arnold变换的图像信息伪装算法[J].计算机应用研究,2006,23(1):235-238. 被引量:19
  • 4高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 5Kwok H S,Tang W K S.A fast image encryption system based on chaotic maps with finite precision representation[J].Chaos,Soli tons & Fractals, 2007,32(4 ) : 1518-1529.
  • 6Lu J,Chen G.A new chaotic attractor coined[J].Int J of Bifurcation and Chaos, 2002,12(3 ) : 659-661.
  • 7Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 8Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 9Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 10Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].

共引文献55

同被引文献40

引证文献10

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部