Jan. 30, 2023, 2:10 a.m. | Peihua Zhang, Chenggang Wu, Mingfan Peng, Kai Zeng, Ding Yu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang

cs.CR updates on arXiv.org arxiv.org

Software obfuscation techniques can prevent binary diffing techniques from
locating vulnerable code by obfuscating the third-party code, to achieve the
purpose of protecting embedded device software. With the rapid development of
binary diffing techniques, they can achieve more and more accurate function
matching and identification by extracting the features within the function.
This makes existing software obfuscation techniques, which mainly focus on the
intra-procedural code obfuscation, no longer effective.


In this paper, we propose a new inter-procedural code obfuscation mechanism …

binary code development device embedded embedded device features focus function identification impact obfuscation party protecting rapid software techniques third third-party vulnerable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA