Mechanisms for Source Code Obfuscation in C: Novel Techniques and Implementation

被引:0
|
作者
Ahire, Pallavi [1 ]
Abraham, Jibi [2 ]
机构
[1] Savitribai Phule Pune Univ, Dept Technol, Pune, Maharashtra, India
[2] Coll Engn, Pune, Maharashtra, India
关键词
Cloud Computing; Source Code Transformation; Code Obfuscation; Data Obfuscation;
D O I
10.1109/esci48226.2020.9167661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to exponential growth of internet, there is abundant assistance available online to learn programming languages much more efficiently. Most of the programmers use this valuable knowledge for the constructive purpose, whereas some of them are using this for the illegal means like unethical hacking, code spoofing, reverse engineering and many more. So to protect the applications from the anonymous attackers, the respective source codes are secured by converting them in the form of .exe, .jar, .bat, .property, .class and .jad files to store at the cloud server end. But most of the repositories store the bare source code at their cloud server end, which is inevitably a feast to the attackers. So to secure the bare source codes, obfuscation techniques are playing a vital role which eventually camouflage the written logic and leave the attacker in confused mode. So as a tiny step towards this idea of obfuscation, this paper presents seven available C obfuscators and four novel data obfuscation techniques that are being applied on '+' arithmetic operator that may lead to the new obfuscation arena.
引用
收藏
页码:52 / 59
页数:8
相关论文
共 50 条
  • [1] Assessment of Source Code Obfuscation Techniques
    Viticchie, Alessio
    Regano, Leonardo
    Torchiano, Marco
    Basile, Cataldo
    Ceccato, Mariano
    Tonella, Paolo
    Tiella, Roberto
    [J]. 2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2016, : 11 - 20
  • [2] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742
  • [3] Implementation of an Obfuscation Tool for C/C plus plus Source Code Protection on the XScale Architecture
    Cho, Seongje
    Chang, Hyeyoung
    Cho, Yookun
    [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 406 - +
  • [4] A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
    Ceccato, Mariano
    Di Penta, Massimiliano
    Falcarin, Paolo
    Ricca, Filippo
    Torchiano, Marco
    Tonella, Paolo
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2014, 19 (04) : 1040 - 1074
  • [5] A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
    Mariano Ceccato
    Massimiliano Di Penta
    Paolo Falcarin
    Filippo Ricca
    Marco Torchiano
    Paolo Tonella
    [J]. Empirical Software Engineering, 2014, 19 : 1040 - 1074
  • [6] Code obfuscation techniques for metamorphic viruses
    Borello, Jean-Marie
    Me, Ludovic
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
  • [7] Different Obfuscation Techniques for Code Protection
    Behera, Chandan Kumar
    Bhaskari, D. Lalitha
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 757 - 763
  • [8] Source Code Obfuscation for Smart Contracts
    Zhang, Meng
    Zhang, Pengcheng
    Luo, Xiapu
    Xiao, Feng
    [J]. 2020 27TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2020), 2020, : 513 - 514
  • [9] Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code
    Kochberger, Patrick
    Gramberger, Maximilian
    Schrittwieser, Sebastian
    Lawitschka, Caroline
    Weippl, Edgar R.
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 7 - 19
  • [10] The malicious code hiding techniques, code obfuscation problem
    Hurtuk, Jan
    Copjak, Marek
    Dufala, Marek
    Drienik, Pavol
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2014), 2014, : 181 - 185