Modern obfuscation methods for secure coding
DOI:
https://doi.org/10.18372/2225-5036.22.10451Keywords:
secure coding, obfuscation, obfuscation methods classification, obfuscation algorithmAbstract
In this paper was done analysis of existing classifications for obfuscation software security methods. Based on the above analysis of these classification it was found that software protection has certain drawbacks such as are not taken into account some obfuscation methods that can strongly increase stability of the code. In this work presented modern obfuscation software security methods and developed generalized classification of these methods. Subsequently, based on developed classification, it is planned to create software based on presented algorithm, that will allow to embrangle code, made the process of software analysis more complicated and will provide software security from unauthorized disclosure. The obtained results expand the knowledge on how to use obfuscation security methods and will provide the development of modern and effective software security systems.References
A generic approach to automatic deobfuscation of executable code / B. Yadegari, B. Johannesmeyer, B. Whitely, S. Debray. – IEEE Symposium Security and Privacy (S&P). – 2014. – 18 p.
Balakrishnan A. Code Obfuscation Literature Survey / A. Balakrishnan, C. Schulze. – Computer Sciences Department, University of Wisconsin, Madison. – 2005. – 10 p.
Buzatu F. Methods for obfuscating Java programs / F. Buzatu // Journal of Mobile, Embedded and Distributed Systems. – 2012. – vol. 4. – P. 25–30.
Collberg C. A taxonomy of obfuscating transformations / C. Collberg, C. Thomborson, D. Low. – Department of Computer Science, The University of Auckland, New Zealand, 1997. – 36 p.
Effects of code obfuscation on android app similarity analysis / [J. Park, H. Kim, Y. Jeong and etc] // Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications(JoWUA). – 2015. – Vol. 6. – P. 86–98.
Garg V., Srivastava A., Mishra A. Obscuring Mobile Agents by Source Code Obfuscation / V. Garg, A. Srivastava, A. Mishra. International Journal of Computer Applications. – 2013. – 61(9). – P. 46-50.
Ilsun Y. Malware obfuscation techniques: A brief survey / Y. Ilsun, Y. Kangbin. – Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010. – 4 p.
Leskov D. Protect your Java code - through obfuscators and beyond [Online] : http://www.excelsior-usa.com/articles/java-obfusca tors.html (Accessed on December 10, 2015).
Lu G. Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach / G. Lu, S. Debray. – Proc. ICISTM-12 Workshop on Program Protection and Reverse Engineering (PPREW), 2012. – 10 p.
Wroblewski G. General Method of Program Code Obfuscation (draft) / G. Wroblewski. – Ph.D. dissertation, Institute of Engineering Cybernetics, Wroclaw University of Technology, 2002. – 120 p.