2021
DOI: 10.1109/access.2021.3094517
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Software Obfuscation Quality–A Systematic Literature Review

Abstract: Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with varying quality and strength have been proposed in the literature. However, the literature on obfuscation techniques has not yet been coherently collated and reviewed. This research paper aims to present an overview of state-of-the-art software obfuscation tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 85 publications
0
20
0
Order By: Relevance
“…As a representative of software source code, C programs are used; they are collected from the GitHub repository 2 . C is still one of the most common PLs in the market [10]. A controlled experiment is conducted where the subjects of the experiment are 12 open source software (OSS) programs written in C; the subjects are arbitrarily selected.…”
Section: B Subjects and Variablesmentioning
confidence: 99%
“…As a representative of software source code, C programs are used; they are collected from the GitHub repository 2 . C is still one of the most common PLs in the market [10]. A controlled experiment is conducted where the subjects of the experiment are 12 open source software (OSS) programs written in C; the subjects are arbitrarily selected.…”
Section: B Subjects and Variablesmentioning
confidence: 99%
“…Multiclass performance metrics are commonly used for measuring and evaluating the quality of malware detection [37]. The same metrics have also been used to validate the proposed model in this study.…”
Section: Performance Measuresmentioning
confidence: 99%
“…or Ph.D. students. Several graduate programs in international universities provide seminar-based courses, including the University of Virginia, 10 Portland State University, 11 and the National University of Singapore. 12 Another observation relevant to this program at Majmaah University is the textbooks used in the three courses.…”
Section: About Ms In Cybersecurity and Digital Forensics At Universit...mentioning
confidence: 99%
“…However, this would be insufficient for students unless they learn how to impede these attacks. While these types of attacks are taught in the courses, the recommendation is to cover software obfuscation techniques (countermeasures) because these attacks and others have been mitigated with the help of such obfuscation techniques [10]. Finally, Secure Source Code essential relates to the programming languages (PLs) used by students.…”
Section: Observations and Recommendations (Rq3)mentioning
confidence: 99%