Towards Experimental Evaluation of Code Obfuscation Techniques

Ceccato, Mariano and Di Penta, Massimiliano and Nagra, Jasvir and Falcarin, Paolo and Ricca, Filippo (2008) ‘Towards Experimental Evaluation of Code Obfuscation Techniques’, Proceedings of the 4th ACM workshop on Quality of Protection, Oct. 2008 Alexandria, Virginia, USA pp. 39-46.

[img]
Preview
Text
Ceccato, M (2008) QoP 39 .pdf - Accepted Version
Available under License Creative Commons Attribution No Derivatives.

Download (143Kb) | Preview
Official URL: http://dx.doi.org/10.1145/1456362.1456371

Abstract

While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be impossible. Nevertheless, obfuscation schemes which in practice slow down malicious reverse-engineering by obstructing code comprehension for even short periods of time are considered a useful protection against malicious reverse engineering. In previous works, the difficulty of reverse engineering has been mainly estimated by means of code metrics, by the computational complexity of static analysis or by comparing the output of de-obfuscating tools. In this paper we take a different approach and assess the difficulty attackers have in understanding and modifying obfuscated code through controlled experiments involving human subjects.

Item Type: Conference or Event Item (Paper)
Additional Information: Citation: Ceccato, M. et al (2008) ‘Towards Experimental Evaluation of Code Obfuscation Techniques’ In: Proceedings of the 4th ACM workshop on Quality of Protection, Oct. 2008 Alexandria, Virginia, USA pp. 39-46.
Divisions: Schools > Architecture Computing and Engineering, School of
Depositing User: Mr Stephen Grace
Date Deposited: 25 Nov 2010 15:56
Last Modified: 22 Feb 2013 13:12
URI: http://hdl.handle.net/10552/1061

Actions (login required)

View Item View Item