ICMScE 2021
Conference Management System
Main Site
Submission Guide
Register
Login
User List | Statistics
Abstract List | Statistics
Paper List
Reviewer List
Presentation Video
Online Q&A Forum
Access Mode
Ifory System
:: Abstract ::

<< back

Binary Obfuscator Development
Sarah Rosdiana Tambunan (a), Tennov Simanjuntak (b*), Ariansyah Nugroho (b), Naomi Nainggolan (b)

Del Institute of Technology
St. P.I. Del, Sitoluama, Lagu Boti, Kabupaten Toba Samosir, Sumatera Utara 22381, Indonesia
sarah.tambunan[at]del.ac.id


Abstract

Many companies indicate that their system had been successfully modified by irresponsible people. That because the source code on the system was readable. This research would develop a Binary Obfuscator tool that could be secure the source code using obfuscation techniques. Obfuscation is a technique to transform a program code into different forms but has the same meaning. Several methods could be used to make an obfuscator, namely polymorphism, metamorphism, and packing. The binary obfuscator only works on portable executable files with the packing method uses the symmetric AES algorithm to change all sections in a portable executable file. The binary Obfuscator will be run in three processes namely Packing Process, Unpacking Process, and Hollowing Process. The Packing process is used to encode the executable file by modifying the algorithm, the Unpacking Process is used to decode the executable file so that it can be run normally. The Hollowing Process is used to inject executable files resulted from Obfuscator to the host process. With this binary obfuscator, an application will be more secure and avoid reverse engineering.

Keywords: Obfuscation- executable file- packing

Topic: Computer Science

Plain Format | Corresponding Author (Sarah Rosdiana Tambunan)

Share Link

Share your abstract link to your social media or profile page

ICMScE 2021 - Conference Management System

Powered By Konfrenzi Ultimate 1.832L-Build9 © 2007-2025 All Rights Reserved