Analysis of complexity metrics of a software code for obfuscating transformations of an executable code

被引:2
|
作者
Kuznetsov, M. A. [1 ]
Surkov, V. O. [1 ]
机构
[1] Reshetnev Siberian State Aerosp Univ, 31 KrasnoyarskiyRabochiy Prospect, Krasnoyarsk 660014, Russia
关键词
D O I
10.1088/1757-899X/155/1/012008
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The complexity metrics of the software code applicable for the analysis of binary files, as well as the methods used at overlaying the obfuscating transformations of these files are considered in the article. The results of the research of the metrics dependence on the performed by special software products obfuscating transformations of a vulnerable binary file are presented. The research confirms the applicability of the technique of the automated vulnerabilities search in binary files, whose analysis is difficult due to obfuscating transformations overlay.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Reliability Evaluation Framework for Obfuscating Transformations in Program Code
    Kitaoka, Tetsuya
    Kanzaki, Yuichiro
    Ishio, Takashi
    Shimari, Kazumasa
    Matsumoto, Kenichi
    Computer Software, 2023, 40 (04): : 37 - 46
  • [2] Design and implementation of obfuscating tool for software code protection
    Kumar, Akshay
    Sharma, Seema
    Lecture Notes in Mechanical Engineering, 2019, : 665 - 676
  • [3] Executable source code and non-executable source code: analysis and relationships
    Robles, G
    Gonzalez-Barahona, JM
    FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 149 - 157
  • [4] Querying distilled code changes to extract executable transformations
    Reinout Stevens
    Tim Molderez
    Coen De Roover
    Empirical Software Engineering, 2019, 24 : 491 - 535
  • [5] The utility of complexity metrics during code reviews for CSE software projects
    Willenbring, James M.
    Walia, Gursimran Singh
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 160 : 65 - 75
  • [6] Querying distilled code changes to extract executable transformations
    Stevens, Reinout
    Molderez, Tim
    De Roover, Coen
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (01) : 491 - 535
  • [7] Extracting Executable Transformations from Distilled Code Changes
    Stevens, Reinout
    De Roover, Coen
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2017, : 171 - 181
  • [8] Probabilistic Alias Analysis of Executable Code
    Yu-Min Lu
    Peng-Sheng Chen
    International Journal of Parallel Programming, 2011, 39 : 663 - 693
  • [9] SOFTWARE METHODS FOR VIRTUAL-STORAGE OF EXECUTABLE CODE
    BROWN, PJ
    COMPUTER JOURNAL, 1979, 22 (01): : 50 - 52
  • [10] Probabilistic Alias Analysis of Executable Code
    Lu, Yu-Min
    Chen, Peng-Sheng
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2011, 39 (06) : 663 - 693