1 / 9

Outline of the Paper

Breaking Abstractions and Unstructuring Data Structures Christian Collberg Clark Thomborson Douglas Low “ Mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of

monty
Download Presentation

Outline of the Paper

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Breaking Abstractions and Unstructuring Data StructuresChristian Collberg Clark Thomborson Douglas Low “Mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of malicious reverse engineering attacks… Code obfuscation is a potent defence against reverse engineering. ”  Reviewer: Hongying lai

  2. Outline of the Paper Obfuscation is a process that renders software unintelligible but still functional. • What is obfuscation ? • Transformation quality • Technique of obfuscation • Conclusion - potency, resilience, stealth and cost. - lexical transformation : modify the lexical structure of the program. - control transformation: alter control structures using opaque predicates. - data transformation : modify inheritance relations, ... In this presentation I will focus on data transformations.

  3. How to Obfuscate Data • Class – modify inheritance. • Procedural abstraction(Java methods) - convert a section of code into a different virtual machine; - inline some methods, and outline other methods; - clone methods. • Variable – split built-in data types. • Arrays – restructure - split an array into several sub-arrays; - merge two or more arrays into one array; - fold an array( increasing the number of dimensions); - flatten and array(decreasing the number of dimensions). In this presentation I shall concentrate on modifying inheritance.

  4. Root C1 C2 V2 M2 V2 M2 V1 M1 modify inheritance • Review of stage-1 CS: what is a Java class - an encapsulation data( V ) and control( M ) . - an aggregation( C2 instance of type C1). - an inheritance ( class C2 extends class C1 ) .

  5. Root C1 C2 V2 M2 Root V1 M1 V M C Root C1 C2 V1 M1 V2 M2 modify inheritance(factoring classes) • the complexity of a class grows with - its depth in the inheritance hierarchy. - the number of its direct descendants. Further from the root More children

  6. Root C1 C3 C2 V3 M3 V1 M1 V2 M2 Root C1 C2 V1 M1 V2 M2 modify inheritance(false refactoring classes) Insert a new bogus class

  7. Root C1 C2 V2 M2 Root V1 M1 V M C Further from the root example public class Cexample{ String message; publicCexample(String message){ this.message = message ; printMessage(); } public void printMessage(){ System.out.println(message); } } public abstract class C1example{ String message; public C1example(String message){ this.message = message ; printMessage(); } public abstract String getMessage(String message); public void printMessage(){ message = getMessage(message); System.out.println(message); } } public class C2example extends C1example{ String message; public C2example(String message){ this.message = message;} public String getMessage(String message){ return message;} }

  8. Conclusion Code obfuscation does not provide an application with absolute protection against a malicious reverse engineering attack. Obfuscation is a cheap way of making reverse engineering so technically difficult that it becomes economically infeasible. Finding new obfuscation techniques is a sophisticatedand challenging problem.

  9. Questions Do you think that the more complicated the obfuscating transformation is , the better ?

More Related