2015 IEEE/ACM 1st International Workshop on Software Protection 2015
DOI: 10.1109/spro.2015.16
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Measuring Software Obfuscation Resilience against Automated Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…In contrast, evaluation through empirical experiments always raises concerns about the possibility that the obfuscation can be effectively nullified by some unknown or future deobfuscation methods not considered by the evaluation. Some recent effort has tried to establish standards for assessing the security strength of obfuscation techniques, but it remains unclear how well they can fit the demands of practical software protection.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, evaluation through empirical experiments always raises concerns about the possibility that the obfuscation can be effectively nullified by some unknown or future deobfuscation methods not considered by the evaluation. Some recent effort has tried to establish standards for assessing the security strength of obfuscation techniques, but it remains unclear how well they can fit the demands of practical software protection.…”
Section: Discussionmentioning
confidence: 99%
“…Practitioners in industry mostly evaluate the resilience of an obfuscation technique through white‐hat penetration tests. Although the procedures of these tests are exceedingly subjected to human intuition and experience, the early steps are fairly standard. Typically, the testers will first use automated reverse engineering tools to transform binary code into a form that is much more convenient for humans to inspect.…”
Section: Discussionmentioning
confidence: 99%
“…and study [52] used two different sub-measures of human efforts to estimate the resilience. Therefore, the total frequency is 84 studies (i.e., greater than the number of primary studies) because of using more than one submeasure by a single author or study.…”
Section: E Measure-based Analysis (Rq5)mentioning
confidence: 99%
“…We use the obfuscation benchmark provided by Banescu [2] as our benchmark programs. A subset of the benchmark contains source code files that are randomly generated by Tigress.…”
Section: B Benchmark Programsmentioning
confidence: 99%