2020
DOI: 10.1186/s42400-020-00049-3
|View full text |Cite
|
Sign up to set email alerts
|

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

Abstract: Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve. Nowadays, this problem becomes even harder as the software economy becomes more diversified. Inspired by the classic idea of layered security for risk management, we propose layered obfuscation as a promising way to realize reliable software obfuscation. Our concept is based on the fact that real-world software is usually complicated. Merely applying one or … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 72 publications
0
2
0
1
Order By: Relevance
“…MulCPI's effectiveness may be hindered by the diverse code obfuscation strategies [47,48] applied to the code under analysis. Techniques such as compression and encryption can disrupt the initial analysis phase by preventing accurate function parsing and extraction, which are critical for MulCPI and other function-level analysis methods.…”
Section: Threats To Validitymentioning
confidence: 99%
“…MulCPI's effectiveness may be hindered by the diverse code obfuscation strategies [47,48] applied to the code under analysis. Techniques such as compression and encryption can disrupt the initial analysis phase by preventing accurate function parsing and extraction, which are critical for MulCPI and other function-level analysis methods.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Obfuscation -consists of sub techniques for modifying the code of the malware to change its signatures and make it more difficult to detect [10]. This includes modifying/reorganizing the source code, object concatenation, splitting and merging techniques so the new relevant signatures are not flagged as malicious [11].…”
Section: B Av Evasion Key Techniquesmentioning
confidence: 99%
“…Malware also can use this technique on vehicles to spread its activity across multiple ECUs' threads in order to evade detection. Other sorts of malware can add dummy instructions to their code to make it look different [244], or use instruction substitution to change their code by substituting equivalent instructions for some of them [245], or use code transposition to reorder the sequence of instructions in their code [246] , or use subroutine reordering to obfuscate their code by randomly rearranging their subroutines [247]. Consequently, malware can evade detection and avoid itself from being properly analyzed by employing such techniques.…”
Section: A Existing Techniques Limitations In Securing Intelligent Vehicles Against Malwarementioning
confidence: 99%