Abstract
We describe a novel method for malicious code obfuscation that uses code already present in systems: a pseudorandom number generator. This can also be seen as an antidisassembly and anti-debugging technique, depending on deployment, because the actual code does not exist until run - it is generated dynamically by the pseudo-random number generator. A year's worth of experiments are used to demonstrate that this technique is a viable code obfuscation option for a malicious adversary with access to large amounts of computing power. © 2009 IEEE.
Original language | American English |
---|---|
Pages | 418-423 |
Number of pages | 6 |
DOIs | |
State | Published - 4 Dec 2009 |
Externally published | Yes |
Event | Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - Duration: 4 Dec 2009 → … |
Conference
Conference | Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 |
---|---|
Period | 4/12/09 → … |