|
Binary Obfuscator Development Del Institute of Technology Abstract Many companies indicate that their system had been successfully modified by irresponsible people. That because the source code on the system was readable. This research would develop a Binary Obfuscator tool that could be secure the source code using obfuscation techniques. Obfuscation is a technique to transform a program code into different forms but has the same meaning. Several methods could be used to make an obfuscator, namely polymorphism, metamorphism, and packing. The binary obfuscator only works on portable executable files with the packing method uses the symmetric AES algorithm to change all sections in a portable executable file. The binary Obfuscator will be run in three processes namely Packing Process, Unpacking Process, and Hollowing Process. The Packing process is used to encode the executable file by modifying the algorithm, the Unpacking Process is used to decode the executable file so that it can be run normally. The Hollowing Process is used to inject executable files resulted from Obfuscator to the host process. With this binary obfuscator, an application will be more secure and avoid reverse engineering. Keywords: Obfuscation- executable file- packing Topic: Computer Science |
| ICMScE 2021 Conference | Conference Management System |