XuanJia: A Comprehensive Virtualization-Based Code Obfuscator for Binary Protection

📅 2026-01-15
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses a critical gap in existing virtualization-based obfuscation schemes, which commonly neglect the protection of exception handling (EH) metadata, thereby leaking sensitive information such as stack layout and control-flow boundaries that can be exploited by reverse engineering. To remedy this, we propose the first end-to-end virtualized obfuscation framework that introduces an innovative ABI-compatible EH shadowing mechanism. This approach encrypts the original EH logic and securely replays it within a protected virtual machine, all while preserving compatibility with unmodified operating system runtimes. For the first time, full semantic obfuscation of EH is achieved. Integrated with x86 instruction-level virtualization—supporting 385 instruction encodings and 155 VM templates—the method effectively disrupts automated reverse engineering tools like IDA Pro while maintaining semantic correctness, incurring negligible space overhead and moderate runtime performance costs.

Technology Category

Application Category

📝 Abstract
Virtualization-based binary obfuscation is widely adopted to protect software intellectual property, yet existing approaches leave exception-handling (EH) metadata unprotected to preserve ABI compatibility. This exposed metadata leaks rich structural information, such as stack layouts, control-flow boundaries, and object lifetimes, which can be exploited to facilitate reverse engineering. In this paper, we present XuanJia, a comprehensive VM-based binary obfuscation framework that provides end-to-end protection for both executable code and exception-handling semantics. At the core of XuanJia is ABI-Compliant EH Shadowing, a novel exception-aware protection mechanism that preserves compatibility with unmodified operating system runtimes while eliminating static EH metadata leakage. XuanJia replaces native EH metadata with ABI-compliant shadow unwind information to satisfy OS-driven unwinding, and securely redirects exception handling into a protected virtual machine where the genuine EH semantics are decrypted, reversed, and replayed using obfuscated code. We implement XuanJia from scratch, supporting 385 x86 instruction encodings and 155 VM handler templates, and design it as an extensible research testbed. We evaluate XuanJia across correctness, resilience, and performance dimensions. Our results show that XuanJia preserves semantic equivalence under extensive dynamic and symbolic testing, effectively disrupts automated reverse-engineering tools such as IDA Pro, and incurs negligible space overhead and modest runtime overhead. These results demonstrate that XuanJia achieves strong protection of exception-handling logic without sacrificing correctness or practicality.
Problem

Research questions and friction points this paper is trying to address.

binary obfuscation
exception handling
metadata leakage
reverse engineering
ABI compatibility
Innovation

Methods, ideas, or system contributions that make the work stand out.

virtualization-based obfuscation
exception handling protection
ABI-compliant shadowing
binary hardening
reverse engineering resistance
🔎 Similar Papers
No similar papers found.
X
Xianyu Zou
College of Computer Science, Nankai University, Tianjin, China
X
Xiaoli Gong
College of Computer Science, Nankai University, Tianjin, China
J
Jin Zhang
College of Computer Science, Nankai University, Tianjin, China
Shiyang Li
Shiyang Li
Amazon
Machine LearningNatural Language ProcessingTime Series Modeling
P
P. Yew
Department of Computer Science and Engineering, University of Minnesota at Twin Cities, Minneapolis, MN, USA