A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software. Applying obfuscation techniques to source code ca...
| Published in: | Applied Sciences |
|---|---|
| Main Authors: | Hongjoo Jin, Jiwon Lee, Sumin Yang, Kijoong Kim, Dong Hoon Lee |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-06-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/14/12/5056 |
Similar Items
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01)
by: Tomer Raitsis, et al.
Published: (2025-01-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)
by: Pu GENG, et al.
Published: (2020-04-01)
Are our clone detectors good enough? An empirical study of code effects by obfuscation
by: Weihao Huang, et al.
Published: (2023-07-01)
by: Weihao Huang, et al.
Published: (2023-07-01)
On the Difficulty of FSM-based Hardware Obfuscation
by: Marc Fyrbiak, et al.
Published: (2018-08-01)
by: Marc Fyrbiak, et al.
Published: (2018-08-01)
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
An obfuscate implementation for Android resources index table
by: Yang LIU, et al.
Published: (2016-10-01)
by: Yang LIU, et al.
Published: (2016-10-01)
An obfuscate implementation for Android resources index table
by: Yang LIU, et al.
Published: (2016-10-01)
by: Yang LIU, et al.
Published: (2016-10-01)
Unsupervised Text Style Transfer for Authorship Obfuscation in Bahasa Indonesia
by: Yunita Sari, et al.
Published: (2023-02-01)
by: Yunita Sari, et al.
Published: (2023-02-01)
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
by: Max Hoffmann, et al.
Published: (2020-12-01)
by: Max Hoffmann, et al.
Published: (2020-12-01)
A Security Analysis of Circuit Clock Obfuscation
by: Rajesh Datta, et al.
Published: (2022-08-01)
by: Rajesh Datta, et al.
Published: (2022-08-01)
Philological obfuscation
by: Chris Ellis
Published: (2009-06-01)
by: Chris Ellis
Published: (2009-06-01)
Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree
by: Hanwen Yi, et al.
Published: (2023-12-01)
by: Hanwen Yi, et al.
Published: (2023-12-01)
DNNobfus: a study on obfuscation-based edge-side model protection framework
by: SONG Feiyang, et al.
Published: (2024-04-01)
by: SONG Feiyang, et al.
Published: (2024-04-01)
DNNobfus: a study on obfuscation-based edge-side model protection framework
by: Feiyang SONG, Xinmiao ZHAO, Fei YAN, Binlin CHENG, Liqiang ZHANG, Xiaolin YANG, Yang WANG
Published: (2024-04-01)
by: Feiyang SONG, Xinmiao ZHAO, Fei YAN, Binlin CHENG, Liqiang ZHANG, Xiaolin YANG, Yang WANG
Published: (2024-04-01)
Author Obfuscation on Indonesian News Articles Using Genetic Algorithms
by: Rayhan Naufal Ramadhan, et al.
Published: (2021-04-01)
by: Rayhan Naufal Ramadhan, et al.
Published: (2021-04-01)
Identifying obfuscated code through graph-based semantic analysis of binary code
by: Roxane Cohen, et al.
Published: (2025-09-01)
by: Roxane Cohen, et al.
Published: (2025-09-01)
Automatic Deobfuscation of VM-protected Programs
by: Evgenyi Ivanovich Goncharov
Published: (2013-02-01)
by: Evgenyi Ivanovich Goncharov
Published: (2013-02-01)
Incorporating contextual factors in agri-environmental research – options for obfuscation to support wider data application
by: P. Nowbakht, et al.
Published: (2025-10-01)
by: P. Nowbakht, et al.
Published: (2025-10-01)
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
by: Petr D. Borisov, et al.
Published: (2019-09-01)
by: Petr D. Borisov, et al.
Published: (2019-09-01)
On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations
by: Petr D. Borisov, et al.
Published: (2021-03-01)
by: Petr D. Borisov, et al.
Published: (2021-03-01)
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
by: Sampsa Rauti, et al.
Published: (2024-01-01)
by: Sampsa Rauti, et al.
Published: (2024-01-01)
RIO: Return Instruction Obfuscation for Bare-Metal IoT Devices
by: Beomseok Kim, et al.
Published: (2023-01-01)
by: Beomseok Kim, et al.
Published: (2023-01-01)
The method of generation program code with indistinguishable functionality
by: Mikhail Andreevich Styugin
Published: (2017-04-01)
by: Mikhail Andreevich Styugin
Published: (2017-04-01)
Research on construction of conditional exception code used in branch obfuscation
by: Pu GENG, et al.
Published: (2020-12-01)
by: Pu GENG, et al.
Published: (2020-12-01)
Research on construction of conditional exception code used in branch obfuscation
by: GENG Pu, ZHU Yuefei
Published: (2020-12-01)
by: GENG Pu, ZHU Yuefei
Published: (2020-12-01)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)
by: M. O. Shudrak, et al.
Published: (2012-12-01)
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
by: Khaled Saleh, et al.
Published: (2025-06-01)
by: Khaled Saleh, et al.
Published: (2025-06-01)
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques
by: V.A. Deepak, et al.
Published: (2019-09-01)
by: V.A. Deepak, et al.
Published: (2019-09-01)
On the evaluation of android malware detectors against code-obfuscation techniques
by: Umair Nawaz, et al.
Published: (2022-06-01)
by: Umair Nawaz, et al.
Published: (2022-06-01)
Anti-obfuscation Android application similarity detection method based on API call
by: Jieming GU, et al.
Published: (2018-01-01)
by: Jieming GU, et al.
Published: (2018-01-01)
Anti-obfuscation Android application similarity detection method based on API call
by: GU Jieming, SUN Bowen, LI Qi, GUO Yanhui, et al.
Published: (2018-01-01)
by: GU Jieming, SUN Bowen, LI Qi, GUO Yanhui, et al.
Published: (2018-01-01)
Authorship Obfuscation System Development based on Long Short-term Memory Algorithm
by: Hendrik Maulana, et al.
Published: (2022-04-01)
by: Hendrik Maulana, et al.
Published: (2022-04-01)
Android Authorship Attribution Using Source Code-Based Features
by: Emre Aydogan, et al.
Published: (2024-01-01)
by: Emre Aydogan, et al.
Published: (2024-01-01)
Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme
by: Hui ZHAO, et al.
Published: (2019-10-01)
by: Hui ZHAO, et al.
Published: (2019-10-01)
Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme
by: Hui ZHAO, et al.
Published: (2019-10-01)
by: Hui ZHAO, et al.
Published: (2019-10-01)
Similar Items
-
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01) -
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01) -
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01) -
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01) -
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
