Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

被引:5
|
作者
Al-Hakimi, Asma'a Mahfoud Hezam [1 ]
Sultan, Abu Bakar Md [1 ]
Abdul Ghani, Abdul Azim [1 ]
Ali, Norhayati Mohd [1 ]
Admodisastro, Novia Indriaty [1 ]
机构
[1] Univ Putra Malaysia UPM, Dept Software Engn & Informat Syst, Fac Comp Sci & Informat Technol, Serdang 43400, Malaysia
关键词
Reverse engineering; Tools; Encryption; Software; !text type='Java']Java[!/text; Intellectual property; Obfuscation techniques; reverse engineering (RE); anti reverse engineering; intellectual property; software security; piracy; !text type='JAVA']JAVA[!/text;
D O I
10.1109/ACCESS.2020.3028428
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. An experiment was conducted to evaluate the proposed Hybrid Obfuscation Technique. The experiment contains two phases; the first phase was conducting reverse engineering against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. The second phase was conducting reverse engineering against the proposed technique to evaluate the effectiveness of it. The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods, and classes correctness test. With these parameters, it was possible to determine the ability of the proposed technique to defend the attack. The experiment has presented good and promising results, where it was nearly impossible for the reversing tool to read the obfuscated code. Even the revealed code did not perform as well as original and obfuscated code.
引用
收藏
页码:187326 / 187342
页数:17
相关论文
共 50 条
  • [1] Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering
    Gnatyuk, Sergiy
    Kinzeryavyy, Vasyl
    Stepanenko, Iryna
    Gorbatyuk, Yana
    Gizun, Andrii
    Kotelianets, Vitalii
    [J]. ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 571 - 580
  • [2] A Code Obfuscation Technique to Prevent Reverse Engineering
    Dalai, Asish Kumar
    Das, Shakya Sundar
    Jena, Sanjay Kumar
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 828 - 832
  • [3] Obfuscation by Code Fragmentation to Evade Reverse Engineering
    Balachandran, Vivek
    Emmanuel, Sahu
    Keong, Ng Wee
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 463 - 469
  • [4] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    [J]. ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [5] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742
  • [6] Design pattern mining from source code for reverse engineering
    Basu, N.
    Chatterjee, S.
    Chaki, N.
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2100 - +
  • [7] ROMEO: Reverse Engineering from OO source code to OMT design
    Theodoros, L
    Edwards, HM
    Bryant, A
    Willis, N
    [J]. FIFTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 1998, : 191 - 200
  • [8] Reverse engineering of design patterns from Java']Java source code
    Shi, Nija
    Olsson, Ronald A.
    [J]. ASE 2006: 21ST IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2006, : 123 - 132
  • [9] Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities
    Asghar, Muhammad Rizwan
    Luxton-Reilly, Andrew
    [J]. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, : 179 - 184
  • [10] A New Code Generation Method for Software Engineering: From Requirements Model to Source Code
    Huang, Bo
    Fang, Zhijun
    Wu, Guoqing
    Sun, Xiankun
    Gao, Yongbin
    [J]. NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 747 - 765