POPL 2021 (series) / PEPM 2021 (series) / PEPM 2021 /
Control Flow Obfuscation for Featherweight Java using Continuation Passing
Control flow obfuscation deters software reverse engineering attempts by altering the program’s control flow transfer. The alternation should not affect the software’s run-time behaviour. In this paper, we propose a control flow obfuscation approach for Featherweight Java with exception handling. The approach is based on a source to source transformation using continuation passing style (CPS). We argue that the proposed CPS transformation causes malicious attacks using context insensitive static analysis and context sensitive analysis with fixed call string to lose precision.
Short paper (paper11.pdf) | 494KiB |
Mon 18 JanDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Mon 18 Jan
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
13:30 - 14:30 | Session 3PEPM at PEPM Chair(s): Robert Atkey University of Strathclyde Live stream: https://www.youtube.com/watch?v=G5vngBBn398 | ||
13:30 30mShort-paper | Control Flow Obfuscation for Featherweight Java using Continuation Passing PEPM Kenny Zhuo Ming Lu ISTD, Singapore University of Technology and Design Media Attached File Attached | ||
14:00 30mResearch paper | Efficient Fair Conjunction for Structurally-Recursive Relations PEPM Petr Lozov Sain Petersburg State University, SPbGU, Dmitri Boulytchev Saint Petersburg State University / JetBrains Research Media Attached File Attached |