ISA2R - Improving Software Analysis and Attack Resilience
Description
This tool consists of a set of diversification and obfuscation transformations implemented as LLVM optimization passes. The set of transformations includes:
- Instruction reordering
- Insertion of loops with randomized iteration count
- Opaque predicate insertion
- Insertion of bogus code
- Stack frame size diversification
- Stack variable order randomization
- Addition of bogus method arguments
- Shuffling of method arguments
- Method cloning
- Method merging
- Randomization of symbolic method names
- Proceduralization of static data
Release Policy
To avoid situations in which ISA2R is misused (e.g. to obfuscate malicious software), we are disclosing its source code only to members of academia and industry who will send an e-mail from an official e-mail address stating the purpose for which s/he will use ISA2R, to the member of our chair who is responsible for this software.