Статья 'Алгоритм обфускации' - журнал 'Кибернетика и программирование' - NotaBene.ru
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

Публикация за 72 часа - теперь это реальность!
При необходимости издательство предоставляет авторам услугу сверхсрочной полноценной публикации. Уже через 72 часа статья появляется в числе опубликованных на сайте издательства с DOI и номерами страниц.
По первому требованию предоставляем все подтверждающие публикацию документы!
MAIN PAGE > Back to contents
Cybernetics and programming

Obfuscation algorithm

Korobeinikov Anatolii Grigor'evich

Doctor of Technical Science

professor, Pushkov institute of terrestrial magnetism, ionosphere and radio wave propagation of the Russian Academy of Sciences St.-Petersburg Filial

199034, Russia, g. Saint Petersburg, ul. Mendeleevskaya, 1

Другие публикации этого автора

Kutuzov Il'ya Mikhailovich

graduate student, Department of Design and Security of Computer Systems, St. Petersburg National Research University of Information Technologies, Mechanics and Optics

197101, Russia, St. Petersburg, Kronverkskiy prospect, d. 49

Другие публикации этого автора




Review date:


Publish date:


Abstract: The paper deals with the algorithm of Chenxi Wang’s, shows are the main disadvantages of this algorithm. The authors suggest the ways of modification to improve it. The algorithm of Chenxi Wang's is one of the most famous. The input data for the algorithm is the usual procedure, written in high level language. The authors describe the three stages of obfuscation of any such procedure. In the classic version of Chenxi Wang's the algorithm has poor stability. The authors suggest ways to improve stability of the algorithm, present modified version of the algorithm and reviews results of its implementation. The authors compare the source code and the resulting code and conclude that it is almost impossible to establish their functional identity and the logic of the program code is very difficult to understand using obfuscated source. Sometimes this can be done using the examples run of the resulting source code. This implies that after eliminating the shortcomings the algorithm is quite effective.

Keywords: obfuscation, technology, source code, algorithm, Chenxi Wang, graph, variable, stability, dynamic analysis, information security
This article written in Russian. You can find full text of article in Russian here .

Christian, C. A Taxonomy of Obfuscating Transformations// Christian Collberg, Clark Thomborson. Douglas Low//Technical Report #148. Department of Computer Science. The University of Auckland. July. 1997.
Chernov, L. V. Analiz zaputyvayushchikh preobrazovanii programm/L.V. Chernov//Trudy Instituta sistemnogo programmirovaniya RAN. Tom 3, 2002 g. ctr. 7-38.
Rollcs, R. Unpacking virtualization obfuscators/R. Rollcs.//In Proc. 3rd USENIX Workshop on Offensive Technologies (WOOT'09), August 2009.
Tikhonov, A. Yu. Metodika izvlecheniya algoritma iz binarnogo koda na osnove dinamicheskogo analiza/ A.Yu.Tikhonov, L.I.Avetisyan, V.A.Iadaryan// Problemy informatsionnoi bezopasnosti. Komp'yuternye sistemy. — 2008. — T. №3. — S. 66-71.
Link to this article

You can simply select and copy link from below text field.

Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website