Obfuscation by Interpretation

Daniel Reynaud 1 Jean-Yves Marion 1
1 CARTE - Theoretical adverse computations, and safety
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : High-level languages such as Java, .NET and Javascript are usually considered less complex to reverse engineer than low-level languages such as assembly, using a subjective notion of complexity. Indeed, obfuscation of low-level code using entry-point obuscuring, code and data mixing and code encryption can lead to difficult to disassemble binaries. This presentation will show that all these low-level obfuscations are possible in high-level languages and therefore analysing high-level programs is no easier. Javascript obfuscations will be provided as examples using a pseudo-assembly language and a processor emulator, but the result holds for every acceptable language.
Type de document :
Communication dans un congrès
3rd International Workshop on the Theory of Computer Viruses - TCV 08, 2008, Nancy, France. 2008
Liste complète des métadonnées

https://hal.inria.fr/inria-00337523
Contributeur : Daniel Reynaud <>
Soumis le : vendredi 7 novembre 2008 - 11:44:40
Dernière modification le : jeudi 11 janvier 2018 - 06:21:25

Identifiants

  • HAL Id : inria-00337523, version 1

Collections

Citation

Daniel Reynaud, Jean-Yves Marion. Obfuscation by Interpretation. 3rd International Workshop on the Theory of Computer Viruses - TCV 08, 2008, Nancy, France. 2008. 〈inria-00337523〉

Partager

Métriques

Consultations de la notice

195