The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Kini teknologi pengkomputeran sedang melalui anjakan paradigma yang besar. Platform pemprosesan tempatan digantikan oleh persekitaran yang jauh dari jangkauan tetapi lebih berkuasa dan berskala seperti platform pengkomputeran awan. Sebelum ini, kami memperkenalkan sistem OJIT sebagai pendekatan baru untuk mengelirukan program yang dilaksanakan dari jauh, menjadikannya sukar bagi pihak lawan untuk membuat kejuruteraan terbalik. Sistem ini mengeksploitasi teknologi kompilasi JIT untuk mengubah kod secara rawak dan dinamik, menjadikannya sentiasa berubah, sekali gus merumitkan keadaan pelaksanaan. Kerja ini bertujuan untuk mencadangkan reka bentuk baharu iOJIT, sebagai pendekatan yang dipertingkatkan yang menambal kelemahan sistem lama, dan berpotensi memberikan kekaburan yang lebih berkesan. Di sini, kami membentangkan kajian analitik tentang teknik pengeliruan pada kod yang dijana dan kos untuk menggunakan transformasi sedemikian dari segi masa pelaksanaan dan overhed prestasi. Berdasarkan kajian pemprofilan ini, kami melaksanakan algoritma baharu untuk memilih teknik pengeliruan yang akan dipilih dengan lebih baik untuk pengeliruan "cekap" mengikut metrik kami, iaitu, kurang terdedah kepada serangan keselamatan. Matlamat lain adalah untuk mengkaji prestasi sistem dengan aplikasi yang berbeza. Oleh itu, kami menggunakan sistem kami pada platform awan yang menjalankan penanda aras standard yang berbeza daripada suite SPEC.
Muhammad HATABA
Egypt-Japan University of Science and Technology (E-JUST)
Ahmed EL-MAHDY
Egypt-Japan University of Science and Technology (E-JUST),Alexandria University
Kazunori UEDA
Waseda University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Muhammad HATABA, Ahmed EL-MAHDY, Kazunori UEDA, "Generation of Efficient Obfuscated Code through Just-in-Time Compilation" in IEICE TRANSACTIONS on Information,
vol. E102-D, no. 3, pp. 645-649, March 2019, doi: 10.1587/transinf.2018EDL8180.
Abstract: Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2018EDL8180/_p
Salinan
@ARTICLE{e102-d_3_645,
author={Muhammad HATABA, Ahmed EL-MAHDY, Kazunori UEDA, },
journal={IEICE TRANSACTIONS on Information},
title={Generation of Efficient Obfuscated Code through Just-in-Time Compilation},
year={2019},
volume={E102-D},
number={3},
pages={645-649},
abstract={Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.},
keywords={},
doi={10.1587/transinf.2018EDL8180},
ISSN={1745-1361},
month={March},}
Salinan
TY - JOUR
TI - Generation of Efficient Obfuscated Code through Just-in-Time Compilation
T2 - IEICE TRANSACTIONS on Information
SP - 645
EP - 649
AU - Muhammad HATABA
AU - Ahmed EL-MAHDY
AU - Kazunori UEDA
PY - 2019
DO - 10.1587/transinf.2018EDL8180
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E102-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2019
AB - Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.
ER -