Author:
Xu Hui,Zhou Yangfan,Ming Jiang,Lyu Michael
Abstract
AbstractSoftware obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve. Nowadays, this problem becomes even harder as the software economy becomes more diversified. Inspired by the classic idea of layered security for risk management, we propose layered obfuscation as a promising way to realize reliable software obfuscation. Our concept is based on the fact that real-world software is usually complicated. Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity. Layered obfuscation, on the other hand, aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution. In the paper, we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques. Following our taxonomy hierarchy, the obfuscation strategies under different branches are orthogonal to each other. In this way, it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference107 articles.
1. Abrath, B, Coppens B, Volckaert S, De Sutter B (2015) Obfuscating windows dlls In: 2015 IEEE/ACM 1st International Workshop on Software Protection, 24–30.. IEEE. https://doi.org/10.1109/spro.2015.13.
2. Apon, D, Huang Y, Katz J, Malozemoff AJ (2014) Implementing cryptographic program obfuscation. IACR Cryptol ePrint Arch.
3. Arboit, G (2002) A method for watermarking java programs via opaque predicates In: The Fifth International Conference on Electronic Commerce Research.
4. Balachandran, V, Emmanuel S (2011) Software code obfuscation by hiding control flow information in stack In: IEEE International Workshop on Information Forensics and Security. https://doi.org/10.1109/wifs.2011.6123121.
5. Balakrishnan, A, Schulze C (2005) Code obfuscation literature survey. CS701 Constr Compilers.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献