A code obfuscation technique to prevent reverse engineering

Author(s):  
Asish Kumar Dalai ◽  
Shakya Sundar Das ◽  
Sanjay Kumar Jena
2012 ◽  
Vol 271-272 ◽  
pp. 636-640
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

The security of software is threatened by piracy, tampering and reverse engineering. Attackers attempt to get important algorithms and sensitive data of software by static analysis or reverse engineering. Software protection becomes an important problem. The algorithm of code obfuscation based on class splitting is proposed that uses of obfuscation technology. The definition of class splitting and realization on algorithm are described. At the same time, the performance on algorithm is analyzed. The obfuscation method enhances the degree of complication about program and static analysis becomes more difficult. The algorithm is applicable to object-oriented program with class structure.


2020 ◽  
Vol 10 (4) ◽  
pp. 55-59
Author(s):  
Asma’a Mahfoud ◽  
Abu Bakar Md. Sultan ◽  
Abdul Azim Abd ◽  
Norhayati Mohd Ali ◽  
Novia Admodisastro

Author(s):  
Pratiksha Gautam ◽  
Hemraj Saini

Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various software protection techniques. However, various techniques have been proposed for copyright protection such as software watermarking, obfuscation, tamper-proofing and diversity. The code transformation (obfuscation) is a method of transforming a program into a form which is more complicated for an adversary to understand or change the original code from an illegitimate process of reverse engineering. None of the current code obfuscation approaches provide resistance from reverse engineering attacks. The reverse engineering threat occurs due to the unconfined software code to the user. Malicious reverse engineering of software codes can be harder by exertion of code transformation on software programs. To address this, we acquaint a peculiar code transformation approach for software protection. The proposed approach is used semantically equivalent to code clone within the source code to protect logical part of program text. We have successfully implement our approach using open source java project Gantt project system and open source java obfuscator's tools. In this paper, we present our approach and demonstrate it with an illustration. The intent of this method is to prevent static analysis attack and make dynamic attack compact for an adversary. This makes it worthwhile against reverse engineering attacks.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 187326-187342
Author(s):  
Asma'a Mahfoud Hezam Al-Hakimi ◽  
Abu Bakar Md Sultan ◽  
Abdul Azim Abdul Ghani ◽  
Norhayati Mohd Ali ◽  
Novia Indriaty Admodisastro

Author(s):  
Humberto Días Pando ◽  
Miguel Rodriguez Veliz ◽  
Yulier Nuñez Musa ◽  
Roberto Sepúlveda Lima

This paper presents the dimentions that defines the Information Security essentials from the authors pointof view and their experience on studying Cryptography, Steganography, controls for data integrity andexecutable components, reverse engineering attacks, information systems auditing and a set of researchingrelated with solving these problems. A critical focusing is applied for expressing the perception that aconsiderable portion of computer science community has about these dimentions. Some advances relatedwith software tamper resistance and code obfuscation techniques are discussed. El artículo presenta las dimensiones que definen los elementos esenciales de la Seguridad de la Informacióndesde el punto de vista de los autores y su experiencia en el estudio de la criptografía, la esteganografía, loscontroles de integridad de datos y componentes ejecutables, ataques de ingeniería inversa, la auditoría desistemas de información y un conjunto de investigaciones relacionadas con la solución de estos problemas.Se discute con enfoque crítico la percepción que sobre estas dimensiones exhibe una parte considerablede la comunidad relacionada con el desarrollo de soluciones informáticas y se enuncian algunos avancesen la obtención de software resistente a modificaciones y a la aplicación de técnicas de ofuscación decódigos.


Sign in / Sign up

Export Citation Format

Share Document