{"title":"基于Collatz猜想的JavaScript路径混淆方法","authors":"Shukai Qin, Zhenyu Wang, Yonghong Wang, Kaijie Xu","doi":"10.1109/WISA.2015.56","DOIUrl":null,"url":null,"abstract":"For the symbolic execution, dynamic taint analysis and theorem proving are widely used in software reverse engineering in recent years, the traditional code obfuscation can't make the JavaScript free of the reverse engineering, although the code may read hardly. Based on that, this paper proposes a code obfuscation technique to against the symbolic execution. This technique is based on the unsolved conjecture which named Collatz conjecture. During the obfuscation, the function is stable as well as the control flow is changed. The experiment shows the method this paper used can implement the code protection to JavaScript. And the experiment prove that because of the unsolved problems, the symbolic execution is lack of necessary technical to do the reverse engineering.","PeriodicalId":198938,"journal":{"name":"2015 12th Web Information System and Application Conference (WISA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Method of JavaScript Path Obfuscation Based on Collatz Conjecture\",\"authors\":\"Shukai Qin, Zhenyu Wang, Yonghong Wang, Kaijie Xu\",\"doi\":\"10.1109/WISA.2015.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the symbolic execution, dynamic taint analysis and theorem proving are widely used in software reverse engineering in recent years, the traditional code obfuscation can't make the JavaScript free of the reverse engineering, although the code may read hardly. Based on that, this paper proposes a code obfuscation technique to against the symbolic execution. This technique is based on the unsolved conjecture which named Collatz conjecture. During the obfuscation, the function is stable as well as the control flow is changed. The experiment shows the method this paper used can implement the code protection to JavaScript. And the experiment prove that because of the unsolved problems, the symbolic execution is lack of necessary technical to do the reverse engineering.\",\"PeriodicalId\":198938,\"journal\":{\"name\":\"2015 12th Web Information System and Application Conference (WISA)\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 12th Web Information System and Application Conference (WISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WISA.2015.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 12th Web Information System and Application Conference (WISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISA.2015.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Method of JavaScript Path Obfuscation Based on Collatz Conjecture
For the symbolic execution, dynamic taint analysis and theorem proving are widely used in software reverse engineering in recent years, the traditional code obfuscation can't make the JavaScript free of the reverse engineering, although the code may read hardly. Based on that, this paper proposes a code obfuscation technique to against the symbolic execution. This technique is based on the unsolved conjecture which named Collatz conjecture. During the obfuscation, the function is stable as well as the control flow is changed. The experiment shows the method this paper used can implement the code protection to JavaScript. And the experiment prove that because of the unsolved problems, the symbolic execution is lack of necessary technical to do the reverse engineering.