2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT) 2016
DOI: 10.1109/icaict.2016.7991694
|View full text |Cite
|
Sign up to set email alerts
|

New approach to software code diversification in interpreted languages based on the moving target technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Both commercial [5,6] and open-source [7,8] obfuscation tools offer a variety of obfuscation techniques. Moreover, the category of researcher-developed obfuscation techniques and tools exhibits a diverse range of characteristics as well [9][10][11][12][13]. However, there are insufficient accurate analysis results regarding the effectiveness of source code obfuscation techniques for each tool; there is also a lack of proven measurement indicators that can quantitatively measure the strength of protection [14,15].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Both commercial [5,6] and open-source [7,8] obfuscation tools offer a variety of obfuscation techniques. Moreover, the category of researcher-developed obfuscation techniques and tools exhibits a diverse range of characteristics as well [9][10][11][12][13]. However, there are insufficient accurate analysis results regarding the effectiveness of source code obfuscation techniques for each tool; there is also a lack of proven measurement indicators that can quantitatively measure the strength of protection [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, numerous studies on obfuscation have turned to quantitative measures when evaluating their techniques. These studies primarily utilize metrics like McCabe cyclomatic complexity [16,12,17,13,18], Line of Code (LoC) [12,[19][20][21], and runtime overhead [9,[22][23][24][25][26]. Nonetheless, there are limitations to assessing obfuscation quality when just a single or a small number of evaluation indicators are used.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to binary obfuscation, source code obfuscation generally has lower performance overhead and is more efficient. Various commercial [6,7] and open-source [8,9] tools, as well as researcher-developed methods [10][11][12][13][14], provide different obfuscation techniques. However, there is a lack of comprehensive analysis and proven quantitative measurement indicators for evaluating the effectiveness of these tools [15,16].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, numerous studies on obfuscation have turned to quantitative measures when evaluating their techniques. These studies primarily utilize metrics like McCabe cyclomatic complexity [13,14,[17][18][19], Line of Code (LoC) [13,[20][21][22], and runtime overhead [10,[23][24][25][26][27][28]. Nonetheless, assessing obfuscation quality when only a single or a small number of evaluation indicators are used has limitations.…”
Section: Introductionmentioning
confidence: 99%