Hybrid obfuscation technique to protect source code from prohibited software reverse engineering

In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strin...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Hakimi, Asma'a Mahfoud Hezam, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Mohd Ali, Norhayati, Admodisastro, Novia Indriaty
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers 2020
Online Access:http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf
http://psasir.upm.edu.my/id/eprint/89227/
https://ieeexplore.ieee.org/document/9211395
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.89227
record_format eprints
spelling my.upm.eprints.892272021-09-03T21:01:07Z http://psasir.upm.edu.my/id/eprint/89227/ Hybrid obfuscation technique to protect source code from prohibited software reverse engineering Al-Hakimi, Asma'a Mahfoud Hezam Md Sultan, Abu Bakar Abdul Ghani, Abdul Azim Mohd Ali, Norhayati Admodisastro, Novia Indriaty In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. An experiment was conducted to evaluate the proposed Hybrid Obfuscation Technique. The experiment contains two phases; the first phase was conducting reverse engineering against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. The second phase was conducting reverse engineering against the proposed technique to evaluate the effectiveness of it. The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods, and classes correctness test. With these parameters, it was possible to determine the ability of the proposed technique to defend the attack. The experiment has presented good and promising results, where it was nearly impossible for the reversing tool to read the obfuscated code. Even the revealed code did not perform as well as original and obfuscated code. Institute of Electrical and Electronics Engineers 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf Al-Hakimi, Asma'a Mahfoud Hezam and Md Sultan, Abu Bakar and Abdul Ghani, Abdul Azim and Mohd Ali, Norhayati and Admodisastro, Novia Indriaty (2020) Hybrid obfuscation technique to protect source code from prohibited software reverse engineering. IEEE Access, 8. 187326 - 187342. ISSN 2169-3536 https://ieeexplore.ieee.org/document/9211395 10.1109/ACCESS.2020.3028428
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. An experiment was conducted to evaluate the proposed Hybrid Obfuscation Technique. The experiment contains two phases; the first phase was conducting reverse engineering against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. The second phase was conducting reverse engineering against the proposed technique to evaluate the effectiveness of it. The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods, and classes correctness test. With these parameters, it was possible to determine the ability of the proposed technique to defend the attack. The experiment has presented good and promising results, where it was nearly impossible for the reversing tool to read the obfuscated code. Even the revealed code did not perform as well as original and obfuscated code.
format Article
author Al-Hakimi, Asma'a Mahfoud Hezam
Md Sultan, Abu Bakar
Abdul Ghani, Abdul Azim
Mohd Ali, Norhayati
Admodisastro, Novia Indriaty
spellingShingle Al-Hakimi, Asma'a Mahfoud Hezam
Md Sultan, Abu Bakar
Abdul Ghani, Abdul Azim
Mohd Ali, Norhayati
Admodisastro, Novia Indriaty
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
author_facet Al-Hakimi, Asma'a Mahfoud Hezam
Md Sultan, Abu Bakar
Abdul Ghani, Abdul Azim
Mohd Ali, Norhayati
Admodisastro, Novia Indriaty
author_sort Al-Hakimi, Asma'a Mahfoud Hezam
title Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
title_short Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
title_full Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
title_fullStr Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
title_full_unstemmed Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
title_sort hybrid obfuscation technique to protect source code from prohibited software reverse engineering
publisher Institute of Electrical and Electronics Engineers
publishDate 2020
url http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf
http://psasir.upm.edu.my/id/eprint/89227/
https://ieeexplore.ieee.org/document/9211395
_version_ 1710677174539780096
score 13.18916