DocumentCode :
3739973
Title :
A Method of JavaScript Path Obfuscation Based on Collatz Conjecture
Author :
Shukai Qin Zhenyu Wang;Yonghong Wang;Kaijie Xu
Author_Institution :
Zhengzhou Inf. Sci. &
fYear :
2015
Firstpage :
330
Lastpage :
333
Abstract :
For the symbolic execution, dynamic taint analysis and theorem proving are widely used in software reverse engineering in recent years, the traditional code obfuscation can´t make the JavaScript free of the reverse engineering, although the code may read hardly. Based on that, this paper proposes a code obfuscation technique to against the symbolic execution. This technique is based on the unsolved conjecture which named Collatz conjecture. During the obfuscation, the function is stable as well as the control flow is changed. The experiment shows the method this paper used can implement the code protection to JavaScript. And the experiment prove that because of the unsolved problems, the symbolic execution is lack of necessary technical to do the reverse engineering.
Keywords :
"Layout","Reverse engineering","Browsers","Algorithm design and analysis","Software","Engines","Organizations"
Publisher :
ieee
Conference_Titel :
Web Information System and Application Conference (WISA), 2015 12th
Print_ISBN :
978-1-4673-9371-3
Type :
conf
DOI :
10.1109/WISA.2015.56
Filename :
7396660
Link To Document :
بازگشت