-
arXiv:1709.08357 [pdf, ps, other]
Generating Functionally Equivalent Programs Having Non-Isomorphic Control-Flow Graphs
Abstract: One of the big challenges in program obfuscation consists in modifying not only the program's straight-line code (SLC) but also the program's control flow graph (CFG). Indeed, if only SLC is modified, the program's CFG can be extracted and analyzed. Usually, the CFG leaks a considerable amount of information on the program's structure. In this work we propose a method allowing to re-write a code… ▽ More
Submitted 25 September, 2017; originally announced September 2017.
Comments: 16 pages paper, published in NordSec 2017 (conference), Proceedings of the Nordic Conference on Secure IT Systems (Nordic 2017)