C source code obfuscator

Lukáš Ďurfina; Dušan Kolář

Kybernetika (2012)

  • Volume: 48, Issue: 3, page 494-501
  • ISSN: 0023-5954

Abstract

top
Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering.

How to cite

top

Ďurfina, Lukáš, and Kolář, Dušan. "C source code obfuscator." Kybernetika 48.3 (2012): 494-501. <http://eudml.org/doc/246697>.

@article{Ďurfina2012,
abstract = {Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering.},
author = {Ďurfina, Lukáš, Kolář, Dušan},
journal = {Kybernetika},
keywords = {obfuscation; source code; malware; obfuscation; source code; malware},
language = {eng},
number = {3},
pages = {494-501},
publisher = {Institute of Information Theory and Automation AS CR},
title = {C source code obfuscator},
url = {http://eudml.org/doc/246697},
volume = {48},
year = {2012},
}

TY - JOUR
AU - Ďurfina, Lukáš
AU - Kolář, Dušan
TI - C source code obfuscator
JO - Kybernetika
PY - 2012
PB - Institute of Information Theory and Automation AS CR
VL - 48
IS - 3
SP - 494
EP - 501
AB - Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering.
LA - eng
KW - obfuscation; source code; malware; obfuscation; source code; malware
UR - http://eudml.org/doc/246697
ER -

References

top
  1. Free Software Foundation, Inc., Volatiles – Using the GNU Compiler Collection, 2010, http://gcc.gnu.org/onlinedocs/gcc/Volatiles.html. 
  2. Harbour, N., Advanced Software Armoring and Polymorphic Kung-Fu, DEFCON 16, 2008. 
  3. Intel, Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference, 1999, http://download.intel.com/design/intarch/manuals/24319101.pdf. 
  4. Karnik, A., Goswami, S., Guha, R., Detecting Obfuscated Viruses Using Cosine Similarity Analysis, Modelling Simulation, 2007. 
  5. Low, D., Protecting Java code via code obfuscation, In: Crossroads – Special Issue on Robotics, 1998. 
  6. Microsoft, MSDN Library, http://msdn.microsoft.com/en-us/library/ms123401.aspx. 
  7. Moser, A., Kruegel, Ch., Kirda, E., Limits of static analysis for malware detection, In: Computer Security Applications Conference, 2007. 
  8. Savarese, Ch., Hart, B., The Caesar Cipher, 1999, http://www.cs.trincoll.edu/ crypto/historical/caesar.html. 

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.