A SOFTWARE FRAMEWORK FOR CODE SECURITY USING M-COT-METRICS BASED CODE OBFUSCATION TECHNIQUE

被引:0
|
作者
Senthilkumar, R. [1 ]
Thangavelu, Arunkumar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
来源
JURNAL TEKNOLOGI | 2016年 / 78卷 / 02期
关键词
Piracy; Obfuscation; M-COT; Cyclomatic Complexity; Reverse Engineering;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Programming security is a paramount concern in IT industry because of its immense monetary misfortunes. Programming is inclined to different security assaults, for example, Software piracy. In this proposal, program security assurance through code Obfuscation, a technique which opposes reverse engineering attacks. In this paper, different sets of criteria are depicted to gauge viability of code obfuscation, for example, intensity: trouble for human to comprehend code, imperviousness to computerized piracy. A large portion of the current obscurity procedures and plans fulfil just a couple of these criteria. In this paper, it shows that the novel code obfuscation plan created for securing exclusive code. A software framework for providing software security using Metric based Code Obfuscation Techniques named as M-COT is designed to propose which will maximize the objectives. The essential thought is to change unique code to obfuscated codes which will concede more state space. This is attained by developing obfuscated non inconsequential code clones for intelligent code parts exhibit in unique code. These code clones that are connected utilizing element predicate variables to present legitimate control flows. The performance of the system is observed by experimentation on a couple of projects (for example, scientific calculator code, searching) to assess our plan. The demonstration made that product unpredictability nature of obfuscated code is higher than that of unique code and comparing to single execution Despite of the fact that the proposal builds the improvement of obfuscated code (because of development of non-inconsequential code clones for legitimate code parts).
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [1] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [2] A code obfuscation framework using code clones
    Kulkarni, Aniket
    Metta, Ravindra
    22nd International Conference on Program Comprehension, ICPC 2014 - Proceedings, 2014, : 295 - 299
  • [3] A Security Model and Implementation of Embedded Software Based on Code Obfuscation
    Yi, Jiajia
    Chen, Lirong
    Zhang, Haitao
    Li, Yun
    Zhao, Huanyu
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613
  • [4] Implicit Code Obfuscation Technique Based on Code Slice Fusion
    Yu P.
    Shu H.
    Xiong X.-B.
    Kang F.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1650 - 1665
  • [5] Technique of Code Obfuscation Based on Class Structure
    Sun Yongyong
    Huang Guangqiu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 674 - 678
  • [6] Technique of Code Obfuscation Based on Class Splitting
    Sun Yongyong
    Huang Guangqiu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 636 - 640
  • [7] Software Component Selection using Code Metrics based evaluation
    Kaur, Loveleen
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [8] Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering
    Gnatyuk, Sergiy
    Kinzeryavyy, Vasyl
    Stepanenko, Iryna
    Gorbatyuk, Yana
    Gizun, Andrii
    Kotelianets, Vitalii
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 571 - 580
  • [9] A Code Encrypt Technique Based on Branch Condition Obfuscation
    Geng P.
    Zhu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2183 - 2192
  • [10] Predicting Security Vulnerabilities using Source Code Metrics
    Ganesh, Sundarakrishnan
    Ohlsson, Tobias
    Palma, Francis
    PROCEEDINGS OF THE 2021 SWEDISH WORKSHOP ON DATA SCIENCE (SWEDS), 2021,