[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SOSE.2014.57guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A New Code Obfuscation Scheme for Software Protection

Published: 07 April 2014 Publication History

Abstract

IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. Code obfuscation techniques counter such attacks by transforming code into patterns that resist the attacks. None of the current code obfuscation techniques satisfy all the obfuscation effectiveness criteria such as resistance to reverse engineering attacks and state space increase. To address this, we introduce new code patterns that we call nontrivial code clones and propose a new obfuscation scheme that combines nontrivial clones with existing obfuscation techniques to satisfy all the effectiveness criteria. The nontrivial code clones need to be constructed manually, thus adding to the development cost. This cost can be limited by cloning only the code fragments that need protection and by reusing the clones across projects. This makes it worthwhile considering the security risks. In this paper, we present our scheme and illustrate it with a toy example.

Cited By

View all
  • (2019)Enhanced branch obfuscation based on exception handling and encrypted mapping tableProceedings of the ACM Turing Celebration Conference - China10.1145/3321408.3326668(1-9)Online publication date: 17-May-2019
  • (2014)A code obfuscation framework using code clonesProceedings of the 22nd International Conference on Program Comprehension10.1145/2597008.2597807(295-299)Online publication date: 2-Jun-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SOSE '14: Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering
April 2014
504 pages
ISBN:9781479936168

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 April 2014

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Enhanced branch obfuscation based on exception handling and encrypted mapping tableProceedings of the ACM Turing Celebration Conference - China10.1145/3321408.3326668(1-9)Online publication date: 17-May-2019
  • (2014)A code obfuscation framework using code clonesProceedings of the 22nd International Conference on Program Comprehension10.1145/2597008.2597807(295-299)Online publication date: 2-Jun-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media