Skip to main content
Top

2018 | OriginalPaper | Chapter

A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator

Authors : Xue Yao, Bin Li, Yahong Sun

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the popularity of embedded devices in daily life, the gap of hardware configuration is gradually narrowing, more and more differentiated functions are realized by software. How to effectively protect the intellectual property rights of software becomes very important. Software security issues of embedded software include reverse-engineering, malicious modifications and tampering. At present, most of the pure software protection solution is relatively simple, the protective effect of which is not desirable, while the hardware solutions have non-negligible costs. In this paper we discuss a user-defined code reinforcement technique based on LLVM-Obfuscator. Data and control flow transformation techniques are added based on the common code obfuscation techniques, and Hardware reinforcement solution is simulated by software. So that it does not increase the cost, but has better protective effect than ordinary software.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hong, L., Jianqin, J., Qingkai, Z.: Code obfuscation technology for software protection. Comput. Eng. 32(11), 177–179 (2006) Hong, L., Jianqin, J., Qingkai, Z.: Code obfuscation technology for software protection. Comput. Eng. 32(11), 177–179 (2006)
2.
go back to reference Huowang, C.: The Complication Theory of the Programming Language, p. 166. National Defense Industry Press, Beijing (2009) Huowang, C.: The Complication Theory of the Programming Language, p. 166. National Defense Industry Press, Beijing (2009)
3.
go back to reference Junbo, L.: The Key Technology Research of Compiler Porting Based on LLVM. Nankai University, Tianjin (2012) Junbo, L.: The Key Technology Research of Compiler Porting Based on LLVM. Nankai University, Tianjin (2012)
4.
go back to reference Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM — software protection for the masses. In: IEEE/ACM International Workshop on Software Protection, pp. 3–9 (2015) Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM — software protection for the masses. In: IEEE/ACM International Workshop on Software Protection, pp. 3–9 (2015)
5.
go back to reference Haibo, S., Yuda, S.: Anti-tampering technology of computer software. Mod. Comput. 2, 45–48 (2005) Haibo, S., Yuda, S.: Anti-tampering technology of computer software. Mod. Comput. 2, 45–48 (2005)
6.
go back to reference Xin, Z., Jiayong, L.: Design and implementation of certificate-based RSA signature system. Commun. Technol. 44(2), 73–74 (2011) Xin, Z., Jiayong, L.: Design and implementation of certificate-based RSA signature system. Commun. Technol. 44(2), 73–74 (2011)
Metadata
Title
A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator
Authors
Xue Yao
Bin Li
Yahong Sun
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_111