A Comprehensive Analysis of Software Obfuscation Techniques
DOI:
https://doi.org/10.32628/CSEIT2390376Keywords:
Unauthorized, Obfuscation, Reverse-Engineering, Tampering, Software Protection.Abstract
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering. This study tries to evaluate various obfuscation approaches, such as code obfuscation, control flow obfuscation, and data obfuscation. The findings of this study will contribute to the establishment of best practises for software developers to protect their code from unauthorised access and alteration by providing useful insights into the efficiency of obfuscation approaches in software protection.
References
- Li, Yang, Fei Kang, Hui Shu, Xiaobing Xiong, Zihan Sha, and Zhonghang Sui. "COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics." Security and Communication Networks 2022 (2022).
- Al-Hakimi, Asma’A., and Abu Bakar Md Sultan. "Hybrid Obfuscation of Encryption." Coding Theory Essentials.
- Ceccato, Mariano, Andrea Capiluppi, Paolo Falcarin, and Cornelia Boldyreff. "A large study on the effect of code obfuscation on the quality of java code." Empirical Software Engineering 20 (2015): 1486-1524.
- Patel, Himanshu, Deep Patel, Jaspreet Ahluwalia, Vaishali Kapoor, Karthik Narasimhan, Harmanpreet Singh, Harmanjot Kaur, Gadi Harshitha Reddy, Sai Sushma Peruboina, and Sergey Butakov. "Evaluation of Survivability of the Automatically Obfuscated Android Malware." Applied Sciences 12, no. 10 (2022): 4969.
- Sebastian, Savio Antony, Saurabh Malgaonkar, Paulami Shah, Mudit Kapoor, and Tanay Parekhji. "A study & review on code obfuscation." In 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp. 1-6. IEEE, 2016.
- Khan, Muhammad Salman, Sana Siddiqui, and Ken Ferens. "Cognitive modeling of polymorphic malware using fractal based semantic characterization." In 2017 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1-7. IEEE, 2017.
- Kumar, Renuka, and Anand Raj Essar Vaishakh. "Detection of obfuscation in java malware." Procedia Computer Science 78 (2016): 521-529.
- Sebastian, Savio Antony, Saurabh Malgaonkar, Paulami Shah, Mudit Kapoor, and Tanay Parekhji. "A study & review on code obfuscation." In 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp. 1-6. IEEE, 2016.
- Popa, Marius. "Techniques of program code obfuscation for secure software." Journal of Mobile, Embedded and Distributed Systems 3, no. 4 (2011): 205-219.
- Si, Dan. "Design and implementation of code obfuscator based on random opcode." In Journal of Physics: Conference Series, vol. 2005, no. 1, p. 012096. IOP Publishing, 2021.
- Yasin, Adwan, and Ihab Nasra. "Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)." International Journal of Computer Science and Security (IJCSS) 10, no. 4 (2016): 140.
- Collberg, Christian, G. R. Myles, and Andrew Huntwork. "Sandmark-a tool for software protection research." IEEE security & privacy 1, no. 4 (2003): 40-49.
- Kumar, Krishan, and Prabhpreet Kaur. "A thorough investigation of code obfuscation techniques for software protection." Int. J. Comput. Sci. Eng 3, no. 5 (2015): 158-164.
- Xu, Hui, Yangfan Zhou, Jiang Ming, and Michael Lyu. "Layered obfuscation: a taxonomy of software obfuscation techniques for layered security." Cybersecurity 3, no. 1 (2020): 1-18.
- Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Different obfuscation techniques for code protection." Procedia Computer Science 70 (2015): 757-763.
- Khadka, Ishwor. "Software piracy: A study of causes, effects and preventive measures." (2015).
- Moise, Adrian Cristian. "Particularities of the Forensic Investigation of Software Piracy and Online Piracy." In Proceedings of the 14th International RAIS Conference on Social Sciences and Humanities, pp. 71-76. Scientia Moralitas Research Institute, 2019.
- Bhattathiripad, Vinod, and S. Santhosh Baboo. "Software Piracy Forensics: Impact and Implications of Post‐Piracy Modifications." (2011)
- Hosseinzadeh, Shohreh, Sampsa Rauti, Samuel Laurén, Jari-Matti Mäkelä, Johannes Holvitie, Sami Hyrynsalmi, and Ville Leppänen. "Diversification and obfuscation techniques for software security: A systematic literature review." Information and Software Technology 104 (2018): 72-93.
- Chorus, Caspar, Sander Van Cranenburgh, Aemiro Melkamu Daniel, Erlend Dancke Sandorf, Anae Sobhani, and Teodóra Szép. "Obfuscation maximization-based decision-making: Theory, methodology and first empirical evidence." Mathematical Social Sciences 109 (2021): 28-44.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.