完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Huang, Yu-Lun | en_US |
dc.contributor.author | Tsai, Hsin-Yi | en_US |
dc.date.accessioned | 2014-12-08T15:28:54Z | - |
dc.date.available | 2014-12-08T15:28:54Z | - |
dc.date.issued | 2012-11-01 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.cose.2012.08.003 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/20881 | - |
dc.description.abstract | Software obfuscation is intended to protect a program by thwarting reverse engineering. Several types of software obfuscation have been proposed, and control-flow obfuscation is a commonly adopted one. In this paper, we present a framework to evaluate parallel control-flow obfuscation, which raises difficulty of reverse engineering by increasing parallelism of a program. We also define a control flow graph of a program and some atomic operators for obfuscating transformations. The proposed framework comprises three phases: parsing, formalization and evaluation. A program is first parsed to a control flow graph. Then, we formalize a parallel control-flow obfuscating transformation based on our atomic operators. By selecting target code blocks in the control flow graph and applying obfuscating transformations to the target code blocks, the original program is then obfuscated. In the third phase, we define a measure to calculate the program complexity. The measure can be considered as a degree to which an obfuscating transformation can confuse a human trying to understand the obfuscated program. Such a measure can also be used as the base of the potency metric to estimate the capability of the obfuscated program against reverse engineering. Our novel framework helps efficiently examine a control-flow obfuscating transformation in a systematic manner and helps select an appropriate obfuscating transformation among a number of candidates to better protect a program. (C) 2012 Elsevier Ltd. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Software obfuscation | en_US |
dc.subject | Security evaluation | en_US |
dc.subject | Reverse engineering | en_US |
dc.subject | Software metrics | en_US |
dc.subject | Control flow graph | en_US |
dc.title | A framework for quantitative evaluation of parallel control-flow obfuscation | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.cose.2012.08.003 | en_US |
dc.identifier.journal | COMPUTERS & SECURITY | en_US |
dc.citation.volume | 31 | en_US |
dc.citation.issue | 8 | en_US |
dc.citation.spage | 886 | en_US |
dc.citation.epage | 896 | en_US |
dc.contributor.department | 電控工程研究所 | zh_TW |
dc.contributor.department | Institute of Electrical and Control Engineering | en_US |
dc.identifier.wosnumber | WOS:000312677200004 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |