دورية أكاديمية

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques

التفاصيل البيبلوغرافية
العنوان: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
المؤلفون: Ceccato, Mariano, Di Penta, Massimiliano, Falcarin, P., Ricca, Filippo, Torchiano, Marco, Tonella, Paolo
بيانات النشر: Springer Verlag
سنة النشر: 2013
المجموعة: University of East London (UEL): ROAR
مصطلحات موضوعية: Empirical studies, Software obfuscation, Program comprehension
الوصف: Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: —at least for the tasks we considered—simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.
نوع الوثيقة: article in journal/newspaper
اللغة: unknown
العلاقة: https://repository.uel.ac.uk/download/ced02b9cfeb34ec3a6697a3420b507d11831dcd48945beaa0a3206412d7e6264/567102/A%20Family%20of%20Experiments%20to%20Assess%20the%20Effectiveness%20and%20Efficiency%20of%20Source%20Code%20Obfuscation%20Techniques-%20AM.pdfTest; https://doi.org/10.1007/s10664-013-9248-xTest
DOI: 10.1007/s10664-013-9248-x
الإتاحة: https://doi.org/10.1007/s10664-013-9248-xTest
https://repository.uel.ac.uk/item/85xv3Test
https://repository.uel.ac.uk/download/ced02b9cfeb34ec3a6697a3420b507d11831dcd48945beaa0a3206412d7e6264/567102/A%20Family%20of%20Experiments%20to%20Assess%20the%20Effectiveness%20and%20Efficiency%20of%20Source%20Code%20Obfuscation%20Techniques-%20AM.pdfTest
حقوق: CC BY
رقم الانضمام: edsbas.200C9910
قاعدة البيانات: BASE