Estimating Software Obfuscation Potency with Artificial Neural Networks

被引:7
作者
Canavese, Daniele [1 ]
Regano, Leonardo [1 ]
Basile, Cataldo [1 ]
Viticchie, Alessio [1 ]
机构
[1] Politecn Torino, Turin, Italy
来源
SECURITY AND TRUST MANAGEMENT (STM 2017) | 2017年 / 10547卷
关键词
Software protection; Code obfuscation; Potency; Neural networks; SOURCE CODE OBFUSCATION;
D O I
10.1007/978-3-319-68063-7_13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an approach to estimate the potency of obfuscation techniques. Our approach uses neural networks to accurately predict the value of complexity metrics - which are used to compute the potency - after an obfuscation transformation is applied to a code region. This work is the first step towards a decision support to optimally protect software applications.
引用
收藏
页码:193 / 202
页数:10
相关论文
共 22 条
[1]  
Adebiyi A., 2012, 2012 UKSim 14th International Conference on Computer Modelling and Simulation (UKSim), P19, DOI 10.1109/UKSim.2012.14
[2]  
[Anonymous], INT J FAMILY MED
[3]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]   The Effectiveness of Source Code Obfuscation: an Experimental Assessment [J].
Ceccato, Mariano ;
Di Penta, Massimiliano ;
Nagra, Jasvir ;
Falcarin, Paolo ;
Ricca, Filippo ;
Torchiano, Marco ;
Tonella, Paolo .
ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, 2009, :178-+
[5]   A METRICS SUITE FOR OBJECT-ORIENTED DESIGN [J].
CHIDAMBER, SR ;
KEMERER, CF .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (06) :476-493
[6]  
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[7]  
Collberg Christian, 1997, Technical report
[8]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[9]   Application of BP Neural Network in Wireless Network Security Evaluation [J].
Fu, Jianxin ;
Huang, Lianfen ;
Yao, Yan .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :592-596
[10]   On the design of more secure software-intensive systems by use of attack patterns [J].
Gegick, Michael ;
Williams, Laurie .
INFORMATION AND SOFTWARE TECHNOLOGY, 2007, 49 (04) :381-397