CINXE.COM
Program Camouflage A Systematic Instruction Hiding Method for Protecting Secrets
<?xml version="1.0" encoding="UTF-8"?> <article key="pdf/12648" mdate="2008-07-29 00:00:00"> <author>Yuichiro Kanzaki and Akito Monden and Masahide Nakamura and Ken-ichi Matsumoto</author> <title>Program Camouflage A Systematic Instruction Hiding Method for Protecting Secrets</title> <pages>2365 - 2371</pages> <year>2008</year> <volume>2</volume> <number>7</number> <journal>International Journal of Computer and Information Engineering</journal> <ee>https://publications.waset.org/pdf/12648</ee> <url>https://publications.waset.org/vol/19</url> <publisher>World Academy of Science, Engineering and Technology</publisher> <abstract>This paper proposes an easytouse instruction hiding method to protect software from malicious reverse engineering attacks. Given a source program (original) to be protected, the proposed method (1) takes its modified version (fake) as an input, (2) differences in assembly code instructions between original and fake are analyzed, and, (3) selfmodification routines are introduced so that fake instructions become correct (i.e., original instructions) before they are executed and that they go back to fake ones after they are executed. The proposed method can add a certain amount of security to a program since the fake instructions in the resultant program confuse attackers and it requires significant effort to discover and remove all the fake instructions and selfmodification routines. Also, this method is easy to use (with little effort) because all a user (who uses the proposed method) has to do is to prepare a fake source code by modifying the original source code.</abstract> <index>Open Science Index 19, 2008</index> </article>