asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic

  • Hongjoo Jin
  • , Jiwon Lee
  • , Taehun Kim
  • , Mu Yeol Sung
  • , Dong Hoon Lee*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Commercial virtualization obfuscation tools like VMProtect and Themida, which rely on transforming original code into virtual instructions, have been successfully reverse engineered by attackers. To safeguard the intellectual property of the virtualization obfuscation architecture from reverse engineering, recent works have applied complex Mixed Boolean-Arithmetic (MBA) obfuscation to the handler code responsible for the core functions of the virtualization obfuscation. In this paper, we first show that a state-of-the-art MBA-based protection method such as Loki can be efficiently deobfuscated and then we introduce Loki-Blast. The proposed method effectively simplifies nested MBA expressions, revealing weaknesses in current MBA-based obfuscation methods used in virtualization obfuscation tools. In light of these vulnerabilities, we propose asmMBA, a novel assembly-based MBA obfuscation technique. Applying MBA transformations directly at the assembly level, asmMBA introduces a layer of complexity that complicates the static and dynamic analysis, which enables the software to resist modern deobfuscation tools like MBA-Blast and Chosen-Instruction Attack effectively. Our evaluation shows that asmMBA can generate up to 1042 distinct obfuscated versions of a simple program depending on the protection level. This makes it difficult for attackers to acquire reusable knowledge from the target program, and it also significantly increases the complexity of program analysis. We experimentally demonstrate that asmMBA expressions are not deobfuscated by the MBA deobfuscation tool. These results demonstrate that asmMBA provides strong protection against deobfuscation attacks while maintaining manageable performance overhead, making it a practical solution for real-world software protection.

Original languageEnglish
Title of host publication40th Annual ACM Symposium on Applied Computing, SAC 2025
PublisherAssociation for Computing Machinery
Pages578-587
Number of pages10
ISBN (Electronic)9798400706295
DOIs
Publication statusPublished - 2025 May 14
Event40th Annual ACM Symposium on Applied Computing, SAC 2025 - Catania, Italy
Duration: 2025 Mar 312025 Apr 4

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference40th Annual ACM Symposium on Applied Computing, SAC 2025
Country/TerritoryItaly
CityCatania
Period25/3/3125/4/4

Bibliographical note

Publisher Copyright:
Copyright © 2025 held by the owner/author(s).

Keywords

  • man-at-the-end (MATE) attack
  • mixed boolean-arithmetic (MBA) obfuscation
  • virtualization obfuscation

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic'. Together they form a unique fingerprint.

Cite this