2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP)
Download PDF

Abstract

This article first focuses on the implementation difficulties of software heterogeneous variants, studies the basic principles and implementation mechanisms of pre runtime software intermediate language diversification compilation technology, and combines the characteristics of endogenous security defense architecture. Through efficient equivalent transformation technology at the source code, intermediate representation, binary and other levels, and corresponding code generation technology, it provides multi-level diversified compilation strategies and means, and provides a source code level heterogeneous redundant variant implementation framework for endogenous security defense. Then, to address the issue of software heterogeneity at the intermediate code level, study the compilation process during the intermediate code generation stage; Research and analyze methods such as equivalent instruction replacement, control flow obfuscation, and blank instruction insertion. Propose diversified transformation methods for intermediate languages in application source code, implement diversified compilation techniques based on intermediate language transformation compilation, and achieve software heterogeneity in endogenous security defense architecture. Finally, build a testing environment to support the feasibility verification of the system architecture and key technologies.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles