Abstract
With the popularity of embedded devices in daily life, the gap of hardware configuration is gradually narrowing, more and more differentiated functions are realized by software. How to effectively protect the intellectual property rights of software becomes very important. Software security issues of embedded software include reverse-engineering, malicious modifications and tampering. At present, most of the pure software protection solution is relatively simple, the protective effect of which is not desirable, while the hardware solutions have non-negligible costs. In this paper we discuss a user-defined code reinforcement technique based on LLVM-Obfuscator. Data and control flow transformation techniques are added based on the common code obfuscation techniques, and Hardware reinforcement solution is simulated by software. So that it does not increase the cost, but has better protective effect than ordinary software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hong, L., Jianqin, J., Qingkai, Z.: Code obfuscation technology for software protection. Comput. Eng. 32(11), 177–179 (2006)
Huowang, C.: The Complication Theory of the Programming Language, p. 166. National Defense Industry Press, Beijing (2009)
Junbo, L.: The Key Technology Research of Compiler Porting Based on LLVM. Nankai University, Tianjin (2012)
Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM — software protection for the masses. In: IEEE/ACM International Workshop on Software Protection, pp. 3–9 (2015)
Haibo, S., Yuda, S.: Anti-tampering technology of computer software. Mod. Comput. 2, 45–48 (2005)
Xin, Z., Jiayong, L.: Design and implementation of certificate-based RSA signature system. Commun. Technol. 44(2), 73–74 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yao, X., Li, B., Sun, Y. (2018). A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_111
Download citation
DOI: https://doi.org/10.1007/978-981-10-7605-3_111
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7604-6
Online ISBN: 978-981-10-7605-3
eBook Packages: EngineeringEngineering (R0)