2020
DOI: 10.1109/access.2020.3028428
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

Abstract: In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…String obfuscation is very effective in protecting the code from theft. When the string is obfuscated, only the compiler can read and output it, while it becomes unreadable to humans [7].…”
Section: String Obfuscationmentioning
confidence: 99%
“…String obfuscation is very effective in protecting the code from theft. When the string is obfuscated, only the compiler can read and output it, while it becomes unreadable to humans [7].…”
Section: String Obfuscationmentioning
confidence: 99%
“…The practice of contaminating web applications with malevolent software is termed malware. In Recent Times, a massive number of malwares has been devised for attacking IoT systems [75,76] Control flow side-channel assessment [77], software integrity validation, malware detector [78], Security updates [79] (continued) Reverse Engineering All An attempt to analyze the firmware of IoT devices to reach sensitive data i.e., users' credentials [93] Self-destruction and Tamper proofing, IC/IP Obfuscation and encryption [94,95] (continued) Identity and access management, authentication, multi-factor authentication guidance, dynamic credentials [100] Brute-force attacks S4, S6 An active attack hinges on a trial-and-error strategy to obtain some data such as passwords, finance, identifiers. It employs automatic software to engender a massive amount of successive suppositions to decrypt the ciphertext [85,86] Locking out IP address, discovery tools, brute force site scanning tools [101] Data exposure attacks…”
Section: Allmentioning
confidence: 99%
“…Both commercial [5,6] and open-source [7,8] obfuscation tools offer a variety of obfuscation techniques. Moreover, the category of researcher-developed obfuscation techniques and tools exhibits a diverse range of characteristics as well [9][10][11][12][13]. However, there are insufficient accurate analysis results regarding the effectiveness of source code obfuscation techniques for each tool; there is also a lack of proven measurement indicators that can quantitatively measure the strength of protection [14,15].…”
Section: Introductionmentioning
confidence: 99%