Abstract
Software reliability is an actual problem caused with absence of software protection techniques, especially absence of software code protection from reverse engineering. Computer piracy and illegal software usage makes big damage for state economy. The development of new approaches and modification of existed obfuscation technologies is actual task directed to growing efficiency of secure coding and protection against reverse engineering. In this paper, authors present the obfuscation method for software protection, which ensures protection from reverse engineering. The method is based on a new sequence of obfuscation transformations. Also software tool StiK was developed, and based on the submitted sequence of operations, pseudocode for protection method was created. Experimental study was conducted according to the presented technique. Experimental results show the efficiency and generality of the proposed method (StiK obfuscator is 10% faster as well as 1.37 times more protected than analogues). Consequently, the developed technique can be used to prevent or at least hamper interpretation, decoding, analysis, or reverse engineering of software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yadegari, B., Johannesmeyer, B., Whitely, B., Debray, S.: A generic approach to automatic deobfuscation of executable code. In: IEEE Symposium Security and Privacy (S&P), 18 p. (2014)
Buzatu, F.: Methods for obfuscating Java programs. J. Mobile, Embed. Distrib. Syst. 4, 25–30 (2012)
Hu, Z., S, Gnatyuk, Koval, O., Gnatyuk, V., Bondarovets, S.: Anomaly detection system in secure cloud computing environment. Int. J. Comput. Netw. Inform. Secur. (IJCNIS) 9(4), 10–21 (2017). https://doi.org/10.5815/ijcnis.2017.04.02
Hu, Z., Gnatyuk, V., Sydorenko, V., Odarchenko, R., Gnatyuk, S.: Method for cyberincidents network-centric monitoring in critical information infrastructure. Int. J. Comput. Netw. Inform. Secur. (IJCNIS) 9(6), 30–43 (2017). https://doi.org/10.5815/ijcnis.2017.06.04
Danik, Y., Hryschuk, R., Gnatyuk, S.: Synergistic effects of information and cybernetic interaction in civil aviation. Aviation 20(3), 137–144 (2016)
Garg, V., Srivastava, A., Mishra, A.: Obscuring mobile agents by source code obfuscation. Int. J. Comput. Appl. 61(9), 46–50 (2013)
Stepanenko, I., Kinzeryavyy, V., Nagi, A., Lozinskyi, I.: Modern obfuscation methods for secure coding. Ukrainian Sci. J. Inform. Secur. 22(1), 32–37 (2016). https://doi.org/10.18372/2225-5036.22.10451
Kinzeryavyy, V., Stepanenko, I., Lozinskyi, I.: Obfuscation method for software code protection. Ukraine Eng. Acad. J. 2, 81–85 (2016)
Jeet, K., Dhir, R.: Software module clustering using hybrid socio-evolutionary algorithms. Int. J. Inform. Eng. Electron. Bus. (IJIEEB) 8(4), 43–53 (2016). https://doi.org/10.5815/ijieeb.2016.04.06
Kaur, J., Tomar, P.: Clustering based architecture for software component selection. Int. J. Mod. Educ. Comput. Sci. (IJMECS) 10(8), 33–40 (2018). https://doi.org/10.5815/ijmecs.2018.08.04
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gnatyuk, S., Kinzeryavyy, V., Stepanenko, I., Gorbatyuk, Y., Gizun, A., Kotelianets, V. (2020). Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering. In: Hu, Z., Petoukhov, S., He, M. (eds) Advances in Artificial Systems for Medicine and Education II. AIMEE2018 2018. Advances in Intelligent Systems and Computing, vol 902. Springer, Cham. https://doi.org/10.1007/978-3-030-12082-5_52
Download citation
DOI: https://doi.org/10.1007/978-3-030-12082-5_52
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12081-8
Online ISBN: 978-3-030-12082-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)