System for obfuscating computer code upon disassembly
A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Latest Aladdin Knowledge Systems, Ltd. Patents:
- Virtual smart card system and method
- Efficient remotely-keyed symmetric cryptography for digital rights management
- Method and system for detecting blocking and removing spyware
- Method and system for indicating an executable as trojan horse
- COMPUTER DATA PRODUCT LICENSE INSTALLATION / UPDATE CONFIRMATION
A portion of the disclosure recited in the specification contains material which is subject to copyright protection. Specifically, source code instructions are included for a process by which the present invention is practiced in a computer system. The copyright owner has no objection to the facsimile reproduction of the specification as filed in the Patent and Trademark Office. Otherwise all copyright rights are reserved.
BACKGROUND OF THE INVENTIONThis invention relates in general to computer software and more specifically to a system for preventing accurate disassembly of computer programs.
Computer software manufacturers have a keen interest in protecting their software. Software can be easily copied, in whole or in part, by making digital copies. Other forms of the copying do not require a competitor to copy the actual digital data, but are based on a knowledgeable programmer viewing the instructions within the software to gain information that can allow the programmer to “break” security systems, obtain valuable programming techniques or trade secrets of the software manufacturer, make derivations, manipulate the operation of the original code, etc.
One barrier to copying computer software is that many forms of software are distributed in a format that is not easily decipherable, or readable, by a human.
In
Returning to
Note that all forms of source code 10 that exists after compilation by compiler 12 are, for the most part, unreadable by a human. In other words, object code modules 14, 16 and 18; executable program 22; and executing image 26 are basically unformatted conglomerations of numbers that are extremely difficult to understand.
However, tools exist to decompile, or disassemble, these unreadable versions of source code. Decompiler 28 can accept the unformatted numbers of object code 14, executable program 22 or executing image 26 and produce a readable version of the original source code program. Such a readable version is referred to as decompiled (or disassembled) code 30. While the decompiled code is usually not as readable as original source code 10, it is a very effective tool for allowing an experienced programmer to understand the operation of the computer program and greatly reduces the amount of time required to copy, hack, or otherwise manipulate source code produced by an original programmer.
Thus, it is desirable to produce an invention which prevents, or reduces the effectiveness of decompilation, or disassembly, of compiled or assembled code.
SUMMARY OF THE INVENTIONThe present invention prevents disassembly of computer code. Such prevention includes hiding, masking, or otherwise “obfuscating,” the original code. This helps thwart unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into the program, stealing secrets, making derivative works, etc. The present invention uses special assembly-language instructions to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt (typically a software interrupt) is used to mask some of the subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more words subsequent to the instruction, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes to achieve the original functionality of the program.
A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include software interrupt, “INT,” instructions. Using this approach, up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
In one embodiment, the invention provides a method for obfuscating computer program instructions upon disassembly, the method comprising inserting an obfuscating instruction or causing a disassembler to not disassemble one or more bytes subsequent to the obfuscating instruction; and inserting a branch instruction to invoke execution of the one or more bytes subsequent to the obfuscating instruction.
BRIEF DESCRIPTION OF THE DRAWINGS
In
The obfuscating instruction, and associated instructions, include obfuscating instruction 110, jump instruction 112 and hidden code 114. During execution of the assembly code, the assembly program operates as intended by the original programmer until jump instruction 112 is executed. When jump instruction 112 is executed then obfuscating instruction 110 is skipped and execution proceeds at hidden instructions 114. In other words, obfuscating instruction 110 is never executed. Hidden instructions 114 are part of the instructions written by the original programmer and, thus, are part of the original program. Only jump instruction 112 and obfuscating instruction 110 need to be inserted into the original program.
It should be apparent that the program will operate as originally intended with the exception that a few more cycles of processor time are required in order to perform the jump instruction 112. Also, a few more bytes of information are stored in the program every time the technique of the present invention is used to account for jump instruction 112 and obfuscating instruction (or instructions, as described below). The number of hidden instructions at 114 varies with the specific obfuscating instruction, or instructions, employed, as is discussed in detail, below.
Note that jump instruction 112 need not be immediately adjacent to obfuscating instruction 110. Any instruction that directs a processor to obtain the next instruction from within the “hidden” instructions 114 can be sufficient. Also, although the invention is discussed with respect to hidden instructions 114 being immediately adjacent to obfuscating instruction 110, it is possible that obfuscating instructions may act to hide non-adjacent instructions.
The present invention is described with respect to assembly language code in “ASM” format. Such format is produced, for example, by the Microsoft VC++ compiler. It should be apparent that the techniques of the present invention can be adapted for any type of assembler, or source code, or other computer languages and syntax which provide a suitable obfuscation instruction.
By obfuscating code in different places throughout the program, it is much more difficult for a programmer to obtain useful information. The decompiler loses synchronization with the instructions and can display missing, or incorrect, instructions in place of the actual ones. With enough portions of the code obscured, a would-be hacker is required to trace through all the code, manually. The debugger (or disassembler) is expecting the code to return after a jump to a certain instruction, but the code changes the return location causing the debugger to break out of its gui. Two code examples are provided in Table I and Table II:
A more advanced technique can involve randomly exchanging jump commands in the ASM file with ‘tricky returns.’ This requires pushing the destination address instead of altering the esp register like previous examples. This way, this (intelligent) obfuscation macro would not be competing against other macros. By placing the ‘tricky returns’ where there is already a jump, the byte overhead is reduced.
The instruction “INT 35” has obfuscation properties. Unlike INT 20, no additional data is displayed. In fact, INT's 34-3A or so have the same ability to totally mask three bytes. As an example:
Of course, as much as this is helpful, three bytes of obfuscation is not all that impressive. In tandem with INT 20 though, it is an entirely other story. This example:
-
- jmp $+2
- INT 35h
- jmp $+2
- INT 20h
yielded 14 bytes of obfuscation. Much better! But, then there is this fine example: - jmp $+4
- INT 35h
- INT 20h
only six bytes long, but yielded an incredible 17 bytes of obfuscation over five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Below is some gibberish code that does a fake comparison, then it jumps into the second byte of the compare, which, along with the first byte of the add instruction, cause the program to jump to the byte after the DB. The purpose of this snippet is to confuse the cracker, and in the process obfuscate six bytes. Although unlikely, to avoid collision problems, the me instruction should be switched to jmp.
The object of these are only to obfuscate code. They are classified as ‘petty obfuscators’ because it would be more suitable to reuse a ‘great obfuscator.’
To obfuscate four bytes:
-
- jmp $+4 Note: this may need byteswapping
- DD 0660FBCA3h, BSF SP [REG+4 bytes]
To obfuscate five bytes:
-
- jmp $+4
- DD 0660FBAA3h; BT WORD PTR [REG+4 bytes], 1 byte
To obfuscate six bytes:
-
- jmp $+4
- DD 0660FBAA4h; BT WORD PTR [REG*4+REG+4 bytes], 1 byte
Although the present invention has been discussed with respect to specific embodiments, these embodiments are merely illustrative, and not restrictive, of the invention. The scope of the invention is to be determined solely by the appended claims.
Claims
1. A method for obfuscating computer program instructions upon disassembly, the method comprising:
- inserting an interrupt instruction for causing a disassembler to not disassemble one or more bytes subsequent to the interrupt instruction; and
- inserting a branch instruction to invoke execution of one or more bytes subsequent to the interrupt instruction.
2. The method of claim 1 and comprising repeating said inserting an interrupt instruction and said inserting a branch instruction.
3. The method of claim 1, wherein said branch instruction is a jump instruction.
4. The method of claim 1, wherein the steps are performed manually.
5. The method of claim 1, wherein the steps are performed by a software process.
6. The method of claim 5, wherein parameters are supplied to the software process, the method further comprising supplying a parameter to the software process to specify the frequency with which an interrupt instruction is to be inserted in a predetermined program.
7. The method of claim 6, wherein the frequency is specified as a number of instructions of the predetermined program between each insertion of the [obfuscating] interrupt instruction.
8. A computer-readable media including the following instructions executable by a processor:
- an interrupt instruction for causing a disassembler to not disassemble one or more bytes subsequent to the interrupt instruction; and
- a branch instruction to invoke execution of one or more bytes subsequent to the interrupt instruction.
9. A computer-readable media including the following obfuscating instructions executable by a processor:
- JMP $+4
- INT 35h
10. A computer-readable media including the following obfuscating instructions executable by a processor:
- JMP $+4
- INT 35h
- INT 20h
11. An apparatus for obfuscating computer program instructions upon disassembly, the apparatus comprising:
- an interrupt instruction for causing a disassembler to not disassemble one or more bytes subsequent to the interrupt instruction; and
- a branch instruction to invoke execution of one or more bytes subsequent to the interrupt instruction.
Type: Application
Filed: Oct 31, 2005
Publication Date: Mar 9, 2006
Applicant: Aladdin Knowledge Systems, Ltd. (Tel Aviv)
Inventors: Bin Xu (Sunnyvale, CA), Jim Sesma (White City, OR), Robert Freeman (Orange County, CA), Weijun Li (Sunnyvale, CA)
Application Number: 11/264,713
International Classification: G06F 12/14 (20060101);