2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2016
DOI: 10.1109/scam.2016.17
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of Source Code Obfuscation Techniques

Abstract: Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscation techniques are divided in code and data obfuscation, depending on the protected asset. While preliminary empirical studies have been conducted to determine the impact of code obfuscation, our work aims at assessing the effectiveness and efficiency in preventing attacks of a specific data obfusca… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Alessio Viticchi et al [12] Obfuscation technique is normally used in software protection for hiding the software development codes. Dividing it into two major parts -code obfuscation and data obfuscation.…”
Section: Related Workmentioning
confidence: 99%
“…Alessio Viticchi et al [12] Obfuscation technique is normally used in software protection for hiding the software development codes. Dividing it into two major parts -code obfuscation and data obfuscation.…”
Section: Related Workmentioning
confidence: 99%
“…Other properties of translated/obfuscated code, such us how harder it is to understand and to attack, are out of the scope of the present paper. To investigate these properties, human studies and controlled experiment are required, and we are planning and conducting them as part of our research activity [5], [24], [6] A. Case Studies…”
Section: Empirical Validationmentioning
confidence: 99%
“…There are two main research approaches for the assessment of obfuscation protection techniques, respectively based on internal software metrics [18], [19], [20], [21], [22], [23] and on experiments involving human subjects [24], [25], [26], [27].…”
Section: B Empirical Studies On the Effectiveness Of Code Protectionmentioning
confidence: 99%
“…Ceccato et al [25] measured the correctness and effectiveness achieved by subjects while understanding and modifying decompiled obfuscated Java code, in comparison with decompiled clear code. This work has been extended with a larger set of experiments and additional obfuscation techniques in successive works [26], [27].…”
Section: B Empirical Studies On the Effectiveness Of Code Protectionmentioning
confidence: 99%