Program obfuscation: a quantitative approach
B Anckaert, M Madou, B De Sutter, B De Bus… - Proceedings of the …, 2007 - dl.acm.org
Proceedings of the 2007 ACM workshop on Quality of protection, 2007•dl.acm.org
Despite the recent advances in the theory underlying obfuscation, there still is a need to
evaluate the quality of practical obfuscating transformations more quickly and easily. This
paper presents the first steps toward a comprehensive evaluation suite consisting of a
number of deobfuscating transformations and complexity metrics that can be readily applied
on existing and future transformations in the domain of binary obfuscation. In particular, a
framework based on software complexity metrics measuring four program properties: code …
evaluate the quality of practical obfuscating transformations more quickly and easily. This
paper presents the first steps toward a comprehensive evaluation suite consisting of a
number of deobfuscating transformations and complexity metrics that can be readily applied
on existing and future transformations in the domain of binary obfuscation. In particular, a
framework based on software complexity metrics measuring four program properties: code …
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. This paper presents the first steps toward a comprehensive evaluation suite consisting of a number of deobfuscating transformations and complexity metrics that can be readily applied on existing and future transformations in the domain of binary obfuscation. In particular, a framework based on software complexity metrics measuring four program properties: code, control flow, data and data flow is suggested. A number of well-known obfuscating and deobfuscating transformations are evaluated based upon their impact on a set of complexity metrics. This enables us to quantitatively evaluate the potency of the (de)obfuscating transformations.
ACM Digital Library