Advertisement

A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator

  • Xue Yao
  • Bin Li
  • Yahong Sun
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

With the popularity of embedded devices in daily life, the gap of hardware configuration is gradually narrowing, more and more differentiated functions are realized by software. How to effectively protect the intellectual property rights of software becomes very important. Software security issues of embedded software include reverse-engineering, malicious modifications and tampering. At present, most of the pure software protection solution is relatively simple, the protective effect of which is not desirable, while the hardware solutions have non-negligible costs. In this paper we discuss a user-defined code reinforcement technique based on LLVM-Obfuscator. Data and control flow transformation techniques are added based on the common code obfuscation techniques, and Hardware reinforcement solution is simulated by software. So that it does not increase the cost, but has better protective effect than ordinary software.

References

  1. 1.
    Hong, L., Jianqin, J., Qingkai, Z.: Code obfuscation technology for software protection. Comput. Eng. 32(11), 177–179 (2006)Google Scholar
  2. 2.
    Huowang, C.: The Complication Theory of the Programming Language, p. 166. National Defense Industry Press, Beijing (2009)Google Scholar
  3. 3.
    Junbo, L.: The Key Technology Research of Compiler Porting Based on LLVM. Nankai University, Tianjin (2012)Google Scholar
  4. 4.
    Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM — software protection for the masses. In: IEEE/ACM International Workshop on Software Protection, pp. 3–9 (2015)Google Scholar
  5. 5.
    Haibo, S., Yuda, S.: Anti-tampering technology of computer software. Mod. Comput. 2, 45–48 (2005)Google Scholar
  6. 6.
    Xin, Z., Jiayong, L.: Design and implementation of certificate-based RSA signature system. Commun. Technol. 44(2), 73–74 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Systems Engineering Research InstituteBeijingChina

Personalised recommendations