
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,191,933 |
PDF Download | 5,622,577 |
Software Obfuscation with Analytical Hierarchy Process and Petri Nets | ||
مجله نوآوری های فناوری اطلاعات و ارتباطات کاربردی | ||
Volume 2, Issue 1, March 2022, Pages 55-66 PDF (1.2 M) | ||
Document Type: Original Article | ||
Authors | ||
mohammad khanjani1; Saeed Parsa* 2 | ||
1Graduated from Iran University of Science and Technology, Tehran | ||
2iust | ||
Receive Date: 06 August 2021, Revise Date: 15 November 2021, Accept Date: 08 March 2022 | ||
Abstract | ||
Obfuscation in the general sense is a technique that makes it more difficult to read and analyze the code of a program, which is done for the purpose of software security. For reverse engineering, a control flow graph is commonly used. As a result, this graph of the control flow must be obfuscated in some way. In this paper, the control flow graph using multi-threaded petri nets with a hierarchical selector is obscured. The main discussion is about dividing the code into sections so that the program runs in separate threads. These threads should be managed by the thread manager so that there is no problem in executing them. The more complex the petri net used to model the program, the more difficult it is to reverse engineering. The slightest change in the execution process by using stopping points affects the selection of the hierarchical selector, and as a result, the program does not go through its main process. | ||
Keywords | ||
Multi-Threaded Petri Nets; Hierarchical Selector; Control Flow Graph; Reverse Engineering | ||
References | ||
| ||
Statistics Article View: 261 PDF Download: 252 |