A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations

Hsin-Yi Tsai, Yu-Lun Huang, D. Wagner
2009 IEEE Transactions on Information Forensics and Security  
Modern obfuscation techniques are intended to discourage reverse engineering and malicious tampering of software programs. We study control-flow obfuscation, which works by modifying the control flow of the program to be obfuscated, and observe that it is difficult to evaluate the robustness of these obfuscation techniques. In this paper, we present a framework for quantitative analysis of control-flow obfuscating transformations. Our framework is based upon the control-flow graph of the
more » ... , and we show that many existing control-flow obfuscation techniques can be expressed as a sequence of basic transformations on these graphs. We also propose a new measure of the difficulty of reversing these obfuscated programs, and we show that our framework can be used to easily evaluate the space penalty due to the transformations.
doi:10.1109/tifs.2008.2011077 fatcat:cdqhmcppfnhyloyjwiscusx7nu