A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator
With the popularity of embedded devices in daily life, the gap of hardware configuration is gradually narrowing, more and more differentiated functions are realized by software. How to effectively protect the intellectual property rights of software becomes very important. Software security issues of embedded software include reverse-engineering, malicious modifications and tampering. At present, most of the pure software protection solution is relatively simple, the protective effect of which is not desirable, while the hardware solutions have non-negligible costs. In this paper we discuss a user-defined code reinforcement technique based on LLVM-Obfuscator. Data and control flow transformation techniques are added based on the common code obfuscation techniques, and Hardware reinforcement solution is simulated by software. So that it does not increase the cost, but has better protective effect than ordinary software.
- 1.Hong, L., Jianqin, J., Qingkai, Z.: Code obfuscation technology for software protection. Comput. Eng. 32(11), 177–179 (2006)Google Scholar
- 2.Huowang, C.: The Complication Theory of the Programming Language, p. 166. National Defense Industry Press, Beijing (2009)Google Scholar
- 3.Junbo, L.: The Key Technology Research of Compiler Porting Based on LLVM. Nankai University, Tianjin (2012)Google Scholar
- 4.Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM — software protection for the masses. In: IEEE/ACM International Workshop on Software Protection, pp. 3–9 (2015)Google Scholar
- 5.Haibo, S., Yuda, S.: Anti-tampering technology of computer software. Mod. Comput. 2, 45–48 (2005)Google Scholar
- 6.Xin, Z., Jiayong, L.: Design and implementation of certificate-based RSA signature system. Commun. Technol. 44(2), 73–74 (2011)Google Scholar