RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2020 Number 50, Pages 102–117 (Mi pdm726)

This article is cited in 1 paper

Mathematical Backgrounds of Informatics and Programming

Automatic generation of hash functions for program code obfuscation

R. K. Lebedev

Novosibirsk State University, Novosibirsk, Russia

Abstract: The specifics of hash function applications in code obfuscation are considered, as well as the disadvantages of currently existing hash functions for this purpose. Considering these specifics and disadvantages, an automatic hash function generation method is proposed, that is based on a genetic programming approach. Methods of measuring the hash function resilience to automated preimage attacks based on SMT solvers usage and random collision resistance are also proposed. Generated functions were evaluated and a method of weak function detection is proposed, that allows to increase the resilience of generated functions to attacks notably.

Keywords: obfuscation, hash function, genetic programming, avalanche effect, SMT solver.

UDC: 004.056.5

DOI: 10.17223/20710410/50/8



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024