Obfuscation by Interpretation - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Obfuscation by Interpretation

Résumé

High-level languages such as Java, .NET and Javascript are usually considered less complex to reverse engineer than low-level languages such as assembly, using a subjective notion of complexity. Indeed, obfuscation of low-level code using entry-point obuscuring, code and data mixing and code encryption can lead to difficult to disassemble binaries. This presentation will show that all these low-level obfuscations are possible in high-level languages and therefore analysing high-level programs is no easier. Javascript obfuscations will be provided as examples using a pseudo-assembly language and a processor emulator, but the result holds for every acceptable language.
Fichier non déposé

Dates et versions

inria-00337523 , version 1 (07-11-2008)

Identifiants

  • HAL Id : inria-00337523 , version 1

Citer

Daniel Reynaud, Jean-Yves Marion. Obfuscation by Interpretation. 3rd International Workshop on the Theory of Computer Viruses - TCV 08, 2008, Nancy, France. ⟨inria-00337523⟩
93 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More