Binary Obfuscator Development
Sarah Rosdiana Tambunan (a), Tennov Simanjuntak (b*), Ariansyah Nugroho (b), Naomi Nainggolan (b)

Del Institute of Technology
St. P.I. Del, Sitoluama, Lagu Boti, Kabupaten Toba Samosir, Sumatera Utara 22381, Indonesia
sarah.tambunan[at]del.ac.id


Abstract

Many companies indicate that their system had been successfully modified by irresponsible people. That because the source code on the system was readable. This research would develop a Binary Obfuscator tool that could be secure the source code using obfuscation techniques. Obfuscation is a technique to transform a program code into different forms but has the same meaning. Several methods could be used to make an obfuscator, namely polymorphism, metamorphism, and packing. The binary obfuscator only works on portable executable files with the packing method uses the symmetric AES algorithm to change all sections in a portable executable file. The binary Obfuscator will be run in three processes namely Packing Process, Unpacking Process, and Hollowing Process. The Packing process is used to encode the executable file by modifying the algorithm, the Unpacking Process is used to decode the executable file so that it can be run normally. The Hollowing Process is used to inject executable files resulted from Obfuscator to the host process. With this binary obfuscator, an application will be more secure and avoid reverse engineering.

Keywords: Obfuscation- executable file- packing

Topic: Computer Science

ICMScE 2021 Conference | Conference Management System