|
This article is cited in 1 scientific paper (total in 1 paper)
Mathematical Foundations of Computer Security
Application of x86 extensions for code protection
R. K. Lebedev, I. A. Koryakin Novosibirsk State University
Abstract:
A new approach is proposed to protect the program code against reverse engineering tools, such as decompilers and symbolic execution tools. The approach is based on the usage of uncommon x86 processor instructions that could be implemented incorrectly in the aforementioned tools. Existing approaches to this problem are also considered, and the relative performance advantage of the proposed approach is noted. A method for numeric constants obfuscation, following this approach, is developed with the usage of AES-NI extension for the x86 architecture and its AESENC instruction in particular. This method is implemented for Clang compiler with the help of LLVM Intermediate Representation and tested against reverse engineering tools, such as IDA and Ghidra decompilers and angr symbolic execution tool.
Keywords:
code protection, reverse engineering, decompiler, symbolic execution, x86 processor architecture.
Citation:
R. K. Lebedev, I. A. Koryakin, “Application of x86 extensions for code protection”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 138–140
Linking options:
https://www.mathnet.ru/eng/pdma549 https://www.mathnet.ru/eng/pdma/y2021/i14/p138
|
Statistics & downloads: |
Abstract page: | 96 | Full-text PDF : | 40 | References: | 21 |
|