Skip to main content

Function Obfuscation

These are the obfuscation techniques that can be applied to functions. Most of your obfuscation needs will be met by one or more of these features.

Mutation Engine

This is our proprietary mutation engine, designed to generate intricate expressions using a wide array of x86-64 instructions. It transforms simple instruction sequences into highly complex ones that are so tightly integrated that removing even a single instruction will cause them to fail.

Before Import Protection

IDA view of obfuscated code (decompilation safeguards disabled for readability)

Mixed Boolean Arithmetic

Mixed Boolean Arithmetic pass (MBA).

MBA

Loop Encode Semantics

This feature takes simple semantics such as Add, Sub, And, and Xor, then encodes their logic as a loop. This confuses symbolic execution engines because the loop bounds are unknown. When combined with other obfuscation techniques, this feature becomes difficult to pattern match and unroll.

MBA

Opaque Block Duplication Pass

The opaque block duplication pass duplicates code and creates an opaque predicate to determine which path to take. While this doesn’t significantly reduce efficiency, it will double the function size with each iteration applied.

Dematerialize Constants

This feature obscures constants so they are unlikely to reappear in a register or stack memory location. It is ideal for black-box functions that handle sensitive values. However, if the constant is passed to an external function or written to memory based on the original semantics, it may rematerialize.

Loop-Based Constant Encoding

To enhance security against symbolic execution, constants are encoded using a loop structure. The bounds of this loop are intentionally obscured, making it more challenging for symbolic execution engines to effectively unroll and analyze.

Simple Constant Obfuscation

This feature is designed to evade static signature detection methods, such as locating CRC32 constants by scanning for known values. By obscuring these constant values, the aim is to prevent them from being detected during signature scans. Although this obfuscation technique is relatively weak, it remains challenging to reverse without binary analysis tools.

IDA Decompiler Crasher

This setting effectively breaks IDA Pro's decompiler, preventing any further analysis of the currently open file. It is applied directly to the function you want to shield from decompilation and works across all versions of IDA, including the latest release. To witness the impact, apply the setting to a function, locate it in IDA, press F5, and observe as the decompiler crashes.

An example of the outcome is shown below:

IDA Internal Error 1

Any further analysis, decompilation, etc., results in this pop-up message:

IDA Internal Error 2